Skip to main content

An Effective Hybrid Intrusion Detection System for Use in Security Monitoring in the Virtual Network Layer of Cloud Computing Technology

  • Conference paper
  • First Online:
Data Management, Analytics and Innovation

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 839))

Abstract

Security in the cloud computing environment is very important in the detection of intrusions into the virtual network layer. Denial of service (DoS) and distributed denial of service (DDoS) attacks are the main threats to cloud computing, and it is therefore crucial to protect against these types of intrusive attack. In this chapter, the effective monitoring of security by a hybrid intrusion detection system (H-IDS) in the virtual network layer of cloud computing technology is discussed and a detailed view of insider and outsider attackers in the virtual network layer is provided. This framework splits into four layers, namely virtual machine layer, node layer, cloud cluster layer, and cloud layer. Signature and anomaly techniques are used to detect known as well as unknown attacks and all virtual machine (VM) host systems which are available in the cloud computing environment are considered. The cloud cluster layer uses a correlation module (CM) to detect distributed attacks, and the Dempster-Shafer theory (DST) is employed in the final decision-making phase of the intrusion detection system (IDS) in order to improve its accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Turab, N. M., Abu, A., & Shadi, T. (2013). Cloud computing challenges and solutions. International Journal of Computer Networks & Communications (IJCNC), 5(5), 209–216.

    Article  Google Scholar 

  2. Lock, H.-Y. (2012). InfoSec reading room. Reading.

    Google Scholar 

  3. Raghav, I. (2013). Intrusion detection and prevention in cloud environment: A systematic review. International Journal of Computer Applications, 68(24), 7–11.

    Article  Google Scholar 

  4. Mahalakshmi, B., & Suseendran, G. (2016, July). Effectuation of secure authorized deduplication in hybrid cloud. Indian Journal of Science and Technology, 9(25).

    Google Scholar 

  5. Amudhavel, J., et al. (2016). A survey on Intrusion Detection System: State of the art review. Indian Journal of Science and Technology, 9(11), 1–9.

    Google Scholar 

  6. Potteti, S., & Parati, N. (2015). Hybrid intrusion detection architecture for cloud environment. International Journal of Engineering and Computer Science, 4(5), 12146–12151.

    Google Scholar 

  7. Chou, T.-S. (2013). Security threats on cloud computing vulnerabilities. International Journal of Computer Science and Information Technology, 5(3), 79–88.

    Article  Google Scholar 

  8. G. #132 Ismael Valenzuela—Global Director, and Foundstone Consulting Services. Targeted ransomware attacks in the cloud. [Online]. Available: https://files.sans.org/summit/healthcare2016/PDFs/Prediction-2017-I-Survived-a-Ransomware-Attack-in-my-Cloud-Ismael-Valenzuela.pdf. Accessed June 18, 2017.

  9. Pitropakis, N., Anastasopoulou, D., Pikrakis, A., & Lambrinoudakis, C. (2014). If you want to know about a hunter, study his pray: Detection of network based attacks on KVM based cloud environments. Journal of Cloud Computing: Advances, Systems and Applications, 3(1), 20.

    Article  Google Scholar 

  10. Kene, S. G., & Theng, D. P. (2015). A review on intrusion detection techniques for cloud computing and security challenges. In IEEE Sponsored 2nd International Conference on Electronics and Communication Systems (ICECS) (pp. 227–232).

    Google Scholar 

  11. Ansari, G. (2016). Framework for hybrid network intrusion detection and prevention system. Interational Journal of Computer Technology & Application, 7(August), 502–507.

    Google Scholar 

  12. Barabas, M., Homoliak, I., Drozd, M., & Hanacek, P. (2013). Automated malware detection based on novel network behavioral signatures. IACSIT International Journal of Engineering and Technology, 5(2).

    Google Scholar 

  13. Kumar, U. (2015). A survey on intrusion detection systems for cloud computing environment. International Journal of Computer Applications, 109(1), 6–15.

    Article  Google Scholar 

  14. Le Dang, N., Le, D., & Le, V. T. (2016). A new multiple-pattern matching algorithm for the network intrusion detection system. IACSIT International Journal of Engineering and Technology, 8(2).

    Google Scholar 

  15. Puri, A., & Sharma, N. (2017). A novel technique for intrusion detection system for network security using hybrid SVM-cart. International Journal of Engineering Development and Research (IJEDR), 5(2), 155–161.

    Google Scholar 

  16. Vieira, K., Schulter, A., Westphall, C., & Westphall, C. M. (2010). Intrusion detection for grid and cloud computing. IT Professional Magazine, 12(4), 38–43.

    Article  Google Scholar 

  17. Singh, D., Patel, D., Borisaniya, B., & Modi, C. (2016). Collaborative IDS framework for cloud. International Journal of Network Security, 18(4), 699–709.

    Google Scholar 

  18. Kamatchi, A., & Modi, C. N. (2016). An efficient security framework to detect intrusions at virtual network layer of cloud computing. In 19th International ICIN Conference-Innovations in Clouds, Internet and Network (pp. 133–140).

    Google Scholar 

  19. Thong, P. H., & Son, L. H. (2016). An overview of semi-supervised fuzzy clustering algorithms. IACSIT International Journal of Engineering and Technology, 8(4), 301–306.

    Article  Google Scholar 

  20. Sondhi, J. (2014). A review of intrusion detection technique using various technique of machine learning and feature optimization technique. International Journal of Computer Applications, 93(14), 43–47.

    Article  Google Scholar 

  21. Jeong, H. D. J., Hyun, W. S., Lim, J., & You, I. (2012). Anomaly teletraffic intrusion detection systems on Hadoop-based platforms: A survey of some problems and solutions. 2012 15th IEEE International Conference on Network-Based Information Systems (pp. 766–770), NBIS, September, 2012.

    Google Scholar 

  22. Jones, C. B., & Carter, C. (2017). Trusted interconnections between a centralized controller and commercial building HVAC systems for reliable demand response. IEEE Access, 5, 11063–11073.

    Article  Google Scholar 

  23. Mann, A. S., & Kumar, V. (2016, November). An efficient method for estimation of cost in cloud computing using neural network. Indian Journal of Science and Technology, 9(44).

    Google Scholar 

  24. Singh, P., & Hazela, B. (2016). Design & Development of a new hybrid system to Prevent Intrusion at cloud using genetic algorithm. International Journal of Advance Research in Computer Science and Management Studies, 4(6).

    Google Scholar 

  25. De Vos, A. F. (2000). A primer in Bayesian Inference. Web ref: http://personal.vu.nl/a.f.de.vos/primer/primer.pdf

  26. Phule, S. G., & Chavan, G. T. (2015). Intrusion response with Dempster Shafer theory of evidence to detect and overcome routing attack in Mobile Ad hoc Networks. International Research Journal of Engineering and Technology (IRJET), 2(2), 410–416.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. Nathiya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nathiya, T., Suseendran, G. (2019). An Effective Hybrid Intrusion Detection System for Use in Security Monitoring in the Virtual Network Layer of Cloud Computing Technology. In: Balas, V., Sharma, N., Chakrabarti, A. (eds) Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-1274-8_36

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1274-8_36

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1273-1

  • Online ISBN: 978-981-13-1274-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics