Abstract
Cloud computing services are widely used nowadays and need to be more secured for an effective exploitation by the users. One of the most challenging issues in these environments is the security of the hosted data. Many cloud computing providers offer web applications for their clients, this is why the most handling attacks in cloud computing are Distributed Denial of Service (DDoS). In this paper, we provide a comparative performance analysis of intrusion detection systems (IDSs) in a real world lab. The aim is to provide an up to date study for researchers and practitioners to understand the issues related to intrusion detection and to deal with DDoS attacks. This analysis includes intrusion detection rates, time running, etc. In the experiments, we configured a cloud platform using OpenStack and an IDS monitoring the whole network traffic of the web server configured. The results show that Suricata drops fewer packets than Bro and Snort successively when a DDoS attack is happening and detect more malicious packets.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25, 2245–2254 (2014)
Mell, P.M., Grance, T.: The NIST definition of cloud computing, Gaithersburg, MD (2011)
Ricci, R., Eide, E.: The CloudLab Team: Introducing CloudLab: Scientific Infrastructure for Advancing Cloud Architectures and Applications. login, vol. 39. USENIX (2014)
Albin, E.: A comparative analysis of the Snort and Suricata intrusion-detection systems (2011)
Irwin, B., van Riel, J.-P.: Using InetVis to evaluate Snort and Bro scan detection on a network telescope. In: Goodall, J.R., Conti, G., Ma, K.L. (eds.) Mathematics and Visualization, pp. 255–273. Springer, Heidelberg (2008)
Albin, E., Rowe, N.C.: A realistic experimental comparison of the Suricata and Snort intrusion-detection systems. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 122–127. IEEE (2012)
Alqahtani, S.M., John, R.: A comparative study of different fuzzy classifiers for cloud intrusion detection systems alerts. In: 2016 IEEE Symposium Series on Computational Intelligence (SSCI), p. 19. IEEE (2016)
Biermann, E., Cloete, E., Venter, L.: A comparison of intrusion detection systems. Comput. Secur. 20, 676–683 (2001)
Moya, M.A.C.: Analysis and evaluation of the Snort and Bro network intrusion detection (2008)
Park, W., Ahn, S.: Performance comparison and detection analysis in Snort and Suricata environment. Wirel. Pers. Commun. 112, 241–252 (2016)
Salah, K., Kahtani, A.: Performance evaluation comparison of Snort NIDS under Linux and Windows server. J. Netw. Comput. Appl. 33, 6–15 (2010)
White, J.S., Fitzsimmons, T., Matthews, J.N.: Quantitative analysis of intrusion detection systems: Snort and Suricata. In: Ternovskiy, I.V., Chin, P. (eds.) Proceedings of SPIE, p. 875704 (2013)
National Center for Biotechnology Information. http://www.ncbi.nlm.nih.gov
Snort Project. https://www.snort.org/
Suricata. https://suricata-ids.org/
The Bro Network Security Monitor. https://www.bro.org/
OpenStack. https://www.openstack.org/
Vogel, A., Griebler, D., Maron, C.A.F., Schepke, C., Fernandes, L.G.: Private IaaS clouds: a comparative analysis of OpenNebula, CloudStack and OpenStack. In: 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), pp. 672–679. IEEE (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Cherkaoui, R., Zbakh, M., Braeken, A., Touhafi, A. (2017). Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems. In: Sabir, E., García Armada, A., Ghogho, M., Debbah, M. (eds) Ubiquitous Networking. UNet 2017. Lecture Notes in Computer Science(), vol 10542. Springer, Cham. https://doi.org/10.1007/978-3-319-68179-5_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-68179-5_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68178-8
Online ISBN: 978-3-319-68179-5
eBook Packages: Computer ScienceComputer Science (R0)