IDS Based threat monitoring in Cloud Computing

Authors

  • Priya S  Department of Computing Technologies, Research Scholar, SRM Institute of Science and Technology, Kattankulathur, Tamil Nadu, India
  • Dr. R. S. Ponmagal  Department of Computing Technologies, Associate Professor, SRM Institute of Science and Technology, Kattankulathur, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT228110

Keywords:

Cloud computing, IDS, Risk Analysis, Security

Abstract

Cloud computing is one of the most rapidly evolving technologies. Cloud computing has grown in popularity as a result of its benefits such as cost-effectiveness, pay-per-use, scalability, and ease of upgrading. Despite all of these advantages, many firms are hesitant to use cloud environments due to security reasons. The focus of this study is on detecting and identifying theft. It represents a novel way to detecting cyber-attacks in the cloud environment by studying violent attacks patterns using threat assessment techniques. Our solution's goal is to combine information from Intrusion Detection Systems (IDS) implemented in cloud services with risk evaluation data for each attack scenario. Our approach proposes a new qualitative technique for examining each symptom, indication, and risk in order to determine the impact and likelihood of distributed and multi-step attacks against cloud systems. The deployment of this strategy will reduce false positive alarms and improve the IDS' performance.

References

  1. D. L. Meena1 and Dr. J. S. Jadon, “Distributed denial of service attacks and their suggested defense remedial approaches,” International Journal of Advance Research in Computer Science and Management Studies, vol. 2 No. 4, April 2019.
  2. Dr. R. S. Jadon2R. V. Deshmukh and K. K. Devadkar, “Understanding DDoS attack & its effect in cloud environment,” Procedia Computer Science, vol. 49, 2020.
  3. E. Alomari, S. Manickam, B. B. Gupta, S. Karuppayah, and R. Alfaris, “Botnet-based Distributed Denial of Service (DDoS) attacks on web servers: Classification and art,” International Journal of Computer Applications, vol. 49– No.7, July 2018.
  4. M. A. Rajab, J. Zarfoss, F. Monrose, and A Terzis, “My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging,” Usenix Conference, 2021.
  5. Incapsula, “Breaking down Mirai: An IoT DDoS botnet analysis,” 2017, https://www.incapsula.com/blog/malware-analysis-mirai-ddosbotnet.html
  6. S. Gallangher, “Double-dip Internet-of-Things botnet attack felt across the Internet,” 2019, http://arstechnica.com/security/2019/10/double-dipinternet-of-things-botnet-attack-felt-across-the-internet/
  7. A. Manion, “Security and the Internet of Things,” podcast, 08/25/2019
  8. Radware Ltd., “DDoS survival handbook”, 2019.
  9. B. Youssef, M. Nada, B. Elmehdi, R. Boubker, ”Intrusion detection in cloud computing based attack patterns and risk assessment”, Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 3, pp. 479-484 (2018). [8Youssef, Ben Charhi, et al. ”Intrusion detection in cloud computing based attacks patterns and risk assessment.” Systems of Collaboration (SysCo), International Conference on. IEEE, 2016
  10. CAPEC, ATTACK PATTERN DEFINITION, 2017.
  11. ROSADO, Tiago et BERNARDINO, Jorge. An overview of openstack architecture. In : Proceedings of the 18th International Database Engineering and Applications Symposium. ACM, 2014. p. 366-367
  12. Park, Wonhyung, and Seongjin Ahn.” Performance comparison and detection analysis in Snort and Suricata environment.” Wireless Personal Communications 94.2 (2017): 241-252.
  13. Suricata Intrusion Detection System., [En ligne]. Available: http://www.openinfosecfoundation.org/index.php/download-suricata.
  14. P. G. T. e. a. MELL, The NIST definition of cloud computing, 2021

Downloads

Published

2022-02-28

Issue

Section

Research Articles

How to Cite

[1]
Priya S, Dr. R. S. Ponmagal, " IDS Based threat monitoring in Cloud Computing , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 1, pp.108-114, January-February-2022. Available at doi : https://doi.org/10.32628/CSEIT228110