ABSTRACT
Internet, various kinds of services are delivered using cloud computing. These resources include storing data, servers, databases records, networking systems, and software. Many people choose cloud computing for businesses because of it’s budget-friendly, excellent efficiency and performance features. But lately, the intrusion on cloud-based system raised a significant concern for choosing this platform. Due to the increasing rate of computer networks and their usage, the global IT infrastructure is prone to attacks. If the issue is left unattended, it can cause significant trouble for IT sector. Intrusion detection systems are signature-based, means it would look in a certain type of data packet, and it would watch all the traffic in a network which has visibility to and make a decision if it is good traffic or bad. It alerts analyst to look at the traffic that could be malicious. Snort is an open-source intrusion detection system that can monitor any traffic going in or out of the network and also monitor malicious behavior or any violation. To enable secure and trustworthy information transmission across diverse cloud companies in today’s networked business settings, a high level of security is required. Because cyber-attacks are only getting more complicated these days, it is critical that defense technology keeps up. After traditional security technologies fail, an intrusion detection system functions as an adaptive safeguard device for system security. In our research, we have shown by using this protocol traffic from source 0.0.0.0:68 to DST 255.255.255:67 (UDP) is being blocked on our WAN. It prevents the user from obtaining a DHCP address.
- Omar Achbarou, My Ahmed El Kiram, Outmane Bourkoukou, and Salim Elbouanani. 2018. A new distributed intrusion detection system based on multi-agent system for cloud environment. International Journal of Communication Networks and Information Security 10, 3(2018), 526.Google Scholar
- Celyn Birkinshaw, Elpida Rouka, and Vassilios G Vassilakis. 2019. Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks. Journal of Network and Computer Applications 136 (2019), 71–85.Google ScholarDigital Library
- Vittorio Cozzolino, Nikolai Schwellnus, Jörg Ott, and Aaron Yi Ding. 2020. UIDS: Unikernel-based Intrusion Detection System for the Internet of Things. In DISS 2020-Workshop on Decentralized IoT Systems and Security.Google Scholar
- Sudhir N Dhage and BB Meshram. 2012. Intrusion detection system in cloud computing environment. International Journal of Cloud Computing 1, 2-3 (2012), 261–282.Google ScholarCross Ref
- Mondher Essid, Farah Jemili, and Ouajdi Korbaa. 2019. Distributed Architecture of Snort IDS in Cloud Environment. In International Conference on Intelligent Systems Design and Applications. Springer, 100–111.Google Scholar
- Akash Garg and Prachi Maheshwari. 2016. Performance analysis of snort-based intrusion detection system. In 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), Vol. 1. IEEE, 1–5.Google ScholarCross Ref
- Zohaib Hassan, Roman Odarchenko, Sergiy Gnatyuk, Abnash Zaman, Masroor Shah, 2018. Detection of distributed denial of service attacks using snort rules in cloud computing & remote control systems. In 2018 IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC). IEEE, 283–288.Google ScholarCross Ref
- Mohamed Idhammad, Karim Afdel, and Mustapha Belouch. 2018. Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Computer Science 127 (2018), 35–41.Google ScholarDigital Library
- Dhanamma Jagli, Seema Purohit, and N Subash Chandra. 2017. SaaS CloudQual: a quality model for evaluating software as a service on the cloud computing environment. In Innovations in computer science and engineering. Springer, 73–80.Google Scholar
- R Kalaiprasath, R Elankavi, and R Udayakumar. 2017. Cloud security and compliance-a semantic approach in end to end security. International Journal on Smart Sensing and Intelligent Systems 10, 5(2017).Google ScholarCross Ref
- Nattawat Khamphakdee, Nunnapus Benjamas, and Saiyan Saiyod. 2014. Improving intrusion detection system based on snort rules for network probe attack detection. In 2014 2nd International Conference on Information and Communication Technology (ICoICT). IEEE, 69–74.Google ScholarCross Ref
- George Loukas, Tuan Vuong, Ryan Heartfield, Georgia Sakellari, Yongpil Yoon, and Diane Gan. 2017. Cloud-based cyber-physical intrusion detection for vehicles using deep learning. Ieee Access 6(2017), 3491–3508.Google ScholarCross Ref
- Xiaoyu Ma, Xiao Fu, Bin Luo, Xiaojiang Du, and Mohsen Guizani. 2019. A design of firewall based on feedback of intrusion detection system in cloud environment. In 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, 1–6.Google ScholarDigital Library
- Amar Meryem and Bouabid EL Ouahidi. 2020. Hybrid intrusion detection system using machine learning. Network Security 2020, 5 (2020), 8–19.Google ScholarCross Ref
- Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, and Muttukrishnan Rajarajan. 2013. A survey of intrusion detection techniques in cloud. Journal of network and computer applications 36, 1(2013), 42–57.Google ScholarDigital Library
- Chnar Mustafa Mohammed, Subhi RM Zebaree, 2021. Sufficient comparison among cloud computing services: IaaS, PaaS, and SaaS: A review. International Journal of Science and Business 5, 2 (2021), 17–30.Google Scholar
- Iqra Sattar, Muhammad Shahid, and Younis Abbas. 2015. A review of techniques to detect and prevent distributed denial of service (DDoS) attack in cloud computing environment. International Journal of Computer Applications 115, 8(2015).Google ScholarCross Ref
- Ashish Singh and Kakali Chatterjee. 2017. Cloud security issues and challenges: A survey. Journal of Network and Computer Applications 79 (2017), 88–115.Google ScholarDigital Library
- Nalini Subramanian and Andrews Jeyaraj. 2018. Recent security challenges in cloud computing. Computers & Electrical Engineering 71 (2018), 28–42.Google ScholarCross Ref
- Hamed Tabrizchi and Marjan Kuchaki Rafsanjani. 2020. A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing 76, 12 (2020), 9493–9532.Google Scholar
- I Sumaiya Thaseen and Ch Aswani Kumar. 2014. Intrusion detection model using fusion of PCA and optimized SVM. In 2014 International conference on contemporary computing and informatics (IC3I). IEEE, 879–884.Google ScholarCross Ref
- Luis M Vaquero, Luis Rodero-Merino, and Daniel Morán. 2011. Locking the sky: a survey on IaaS cloud security. Computing 91, 1 (2011), 93–118.Google ScholarDigital Library
- Wenjuan Wang, Xuehui Du, Dibin Shan, Ruoxi Qin, and Na Wang. 2020. Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine. IEEE Transactions on Cloud Computing(2020).Google ScholarCross Ref
- Qingqing Zhang, Hongbian Yang, Kai Li, and Qian Zhang. 2010. Research on the intrusion detection technology with hybrid model. In 2010 The 2nd Conference on Environmental Science and Information Application Technology, Vol. 2. IEEE, 646–649.Google Scholar
Index Terms
- Detecting Intrusion in Cloud using Snort: An Application towards Cyber-Security
Recommendations
Study of snort-based IDS
ICWET '10: Proceedings of the International Conference and Workshop on Emerging Trends in TechnologyGeneral trend in industry is a shift from Intrusion Detection Systems (IDS) to Intrusion Prevention Systems (IPS). In this paper, we have investigated the motivations behind this trend. In addition, we have surveyed some of the available IDS/IPS tools. ...
Intrusion detection system using honeypots and swarm intelligence
ACAI '11: Proceedings of the International Conference on Advances in Computing and Artificial IntelligenceAs the number and size of the Network and Internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required for the intrusion detection and diagnosis, it has made public servers increasingly vulnerable to ...
Detecting, validating and characterizing computer infections in the wild
IMC '11: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conferenceAlthough network intrusion detection systems (IDSs) have been studied for several years, their operators are still overwhelmed by a large number of false-positive alerts. In this work we study the following problem: from a large archive of intrusion ...
Comments