Skip to main content
Log in

HIDS: A host based intrusion detection system for cloud computing environment

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

The paper reports a host based intrusion detection model for Cloud computing environment along with its implementation and analysis. This model alerts the Cloud user against the malicious activities within the system by analyzing the system call traces. The method analyses only selective system call traces, the failed system call trace, rather than all. An early detection of intrusions with reduced computational burden can be possible with this feature. The reported model provides security as a service (SecaaS) in the infrastructure layer of the Cloud environment. Implementation result shows 96 % average intrusion detection sensitivity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Abraham A, Grosan C, Martin-Vide C (2007) Evolutionary design of intrusion detection programs. Int J Netw Secur 4(3):328–339

    Google Scholar 

  • Aggarwal C, Zhai C (2012) A survey of text classification algorithms. In: Mining Text Data. New york, Springer 163–222

  • Anderson J (1980) Computer security threat monitoring and surveillance, Technical report. James P. Anderson Co., Fort Washington

    Google Scholar 

  • Barbhuiya F et al (2011) An active host-based intrusion detection system for ARP-related attacks and its verification. Int J Net Sec App 3(3):163–180

    Google Scholar 

  • Cai L, Chen J, Ke Y, Chen T, Li Z (2010) A new data normalization method for unsupervised anomaly intrusion detection. J Zhejiang Uni-SCI C 11(10):778–784

    Article  Google Scholar 

  • Denning D (1987) An intrusion detection model. IEEE Trans Soft Eng 13(2):222–232

    Article  Google Scholar 

  • Deshpande P, Sharma S, Kumar S (2013) Implementation of a private cloud: a case study. Adv Int Sys Comp 259(2):635–648

    Google Scholar 

  • Doelitzscher F et al (2012) An agent based business aware incident detection system for cloud environments. J Cloud Comp Adv Sys App 1–9. doi:10.1186/2192-113X-1-9

  • Fawcett T (2006) An introduction to ROC analysis. Patt Recog Lett 27:861–874

    Article  Google Scholar 

  • Forrest S, Hofmeyr A, Somayaji A, Longsta T (1996) A sense of self for Unix processes. IEEE Symp Security and Privacy, Oakland, pp 120–128

    Google Scholar 

  • Ghosh A, Schwartzbard A, Shatz A (1999) Learning program behavior profiles for intrusion detection. In: Proceedings of the Ist USENIX workshop on intrusion detection and network monitoring, Santa Clara, California, USA, pp 51–62

  • Htun P, Khaing K (2013) Important roles of data mining techniques for anomaly intrusion detection system. Int J Adv Res Comp Eng Tech 2(5):1850–1854

    Google Scholar 

  • KDD’99 datasets, The UCI KDD Archive Irvine, CA, USA, 1999 [online] http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  • Lee W, Stolfo S,and Chan P (1997) Learning patterns from UNIX process execution traces for intrusion detection. In: Proceedings of the AAAI Workshop on AI Models in Fraud and Risk Management, Stanford, pp 50–56

  • Modi C et al (2013) A survey of intrusion detection techniques in cloud. J Netw Comp App 36:42–57

    Article  Google Scholar 

  • Mukkamala S, Sung A, Abraham A (2004) Designing intrusion detection systems: architectures and perspectives. Annual review of communications, The Int Eng Consortium (IEC), Chicago, 57:1229–1241

  • Payne T et al (1997) Experience with rule induction and k-nearest neighbor methods for interface agents that learn. IEEE Trans Knowl Data Eng 9(2):329–335

    Article  Google Scholar 

  • Rawat S et al (2006) Intrusion detection using text processing techniques with a binary-weighted cosine metric. J Info Assur Security 1:43–50

    Google Scholar 

  • Tandon G and Chan P (2005) Learning useful system call attributes for anomaly detection. In: Proceedings of the 18th International Artificial Intelligence Research Society Conference, Florida, pp 405–410

  • Vokorokos L. and Balaz A (2010) Host-based intrusion detection system. In: 14th International Conference on Intelligent Engineering System, Spain, pp 43–47

  • Warrender C, Forrest S, Pearlmutter B (1999) Detecting intrusions using system calls: alternative data models. IEEE Symposium on Security and Privacy, Oakland, pp 133–145

    Google Scholar 

  • Wespi A, Dacier M, Debar H (2000) Intrusion detection using variable length audit trail patterns. Recent Adv Intru Det 1907:110–129

    Google Scholar 

  • Ying L, Yan Z, Jia O (2010) The design and implementation of host-based intrusion detection system. In: Third International Symposium on Intelligent Information Technology and Security Information, Jinggangshan, pp 595–598

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prachi Deshpande.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Deshpande, P., Sharma, S.C., Peddoju, S.K. et al. HIDS: A host based intrusion detection system for cloud computing environment. Int J Syst Assur Eng Manag 9, 567–576 (2018). https://doi.org/10.1007/s13198-014-0277-7

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-014-0277-7

Keywords

Navigation