Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Multi-tenant intrusion detection system for public cloud (MTIDS)

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Cloud computing is an innovative paradigm technology that is known for its versatility. It provides many creative services as requested, and it is both cost efficient and reliable. More specifically, cloud computing provides an opportunity for tenants to reduce cost and raise effectiveness by offering an alternative method of service utilization. Although these services are easily provided to tenants on demand with minor infrastructure investment, they are significantly exposed to intrusion attempts since the services are offered under the administration of diverse supervision over the Internet. Moreover, the security mechanisms offered by cloud providers do not take into consideration the variation of tenants’ needs as they provide the same security mechanism for all tenants. So, meeting tenants’ security requirements are still a major challenge for cloud providers. In this paper, we concentrate on the security service offered to cloud tenants and service providers and their infrastructure to restrain intruders. We intend to provide a flexible, on-demand, scalable, and pay-as-you-go multi-tenant intrusion detection system as a service that targets the security of the public cloud. Further, it is designed to deliver appropriate and optimized security taking into consideration the tenants’ needs in terms of security service requirements and budget.

This is a preview of subscription content,log in via an institution to check access.

Access this article

Log in via an institution

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Notes

  1. “A function is a process or a relation that associates each element x of a set X, the domain of the function, to a single element y of another set Y (possibly the same set), the codomain of the function” [39].

  2. ”The power set (or powerset) of any set S is the set of all subsets of S, including the empty set and S itself of the set R” [40].

References

  1. Mell P, Grance T (2011) The NIST definition of cloud computing. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg, Gaithersburg

    Book  Google Scholar 

  2. Amazon web services (aws)https://aws.amazon.com. Accessed 1 Jan 2017

  3. Microsoft azure: Cloud computing platform & services.https://azure.microsoft.com. Accessed 19 Mar 2017

  4. Rackspac.https://www.rackspace.com. Accessed 16 Apr 2017

  5. Aruba cloud.https://www.arubacloud.com. Accessed 19 Apr 2017

  6. Almorsy M, Grundy J, Müller I (2016) An analysis of the cloud computing security problem. arXiv preprintarXiv:1609.01107

  7. Demchenko Y, Turkmen F, Slawik M, de Laat C (2017) Defining Intercloud Security Framework and Architecture Components for Multi-Cloud Data Intensive Applications. In: Cluster, cloud and grid computing (CCGRID), 2017 17th IEEE/ACM International Symposium on. IEEE, pp 945–952

  8. Shawish A, Salama M (2014) Cloud computing: paradigms and technologies. In: Inter-cooperative collective intelligence: techniques and applications, Springer, pp 39–67

  9. Patel A, Taghavi M, Bakhtiyari K, JúNior JC (2013) An intrusion detection and prevention system in cloud computing: a systematic review. J Netw Comput Appl 36(1):25–41

    Article  Google Scholar 

  10. Adil M, Ijaz I (2015) IDS in cloud computing to secure virtual environment. Int J Enhanced Res Sci Technol Eng 4(3):199–207

    Article  Google Scholar 

  11. Tan Z, Nagar UT, He X, Nanda P, Liu RP, Wang S, Hu J (2014) Enhancing big data security with collaborative intrusion detection. IEEE Cloud Comput 1(3):27–33

    Article  Google Scholar 

  12. Oasis topology and orchestration specification for cloud applications (TOSCA) TC.https://www.oasis-open.org/committees/tosca/faq.php. Accessed 2 Mar 2017

  13. Modi CN, Acha K (2017) Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review. J Supercomput 73(3):1192–1234

    Article  Google Scholar 

  14. Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18

    Article  Google Scholar 

  15. Osanaiye O, Choo KKR, Dlodlo M (2016) Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J Netw Comput Appl 67:147–165

    Article  Google Scholar 

  16. Park H, Lee EJ, Park DH, Eun, JS, Kim SH (2016) PaaS offering for the big data analysis of each individual APC. In: Information and communication technology convergence (ICTC), 2016 International Conference on. IEEE, pp 30–32

  17. Rosado DG (2012) Security engineering for cloud computing: approaches and tools: approaches and tools. IGI Global

  18. The customer success platform to grow your business.https://www.salesforce.com. Accessed 19 Mar 2017

  19. Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (idps). NIST Spec Publ 800(2007):94

    Google Scholar 

  20. Oktay U, Sahingoz OK (2013) Proxy network intrusion detection system for cloud computing. In: Technological advances in electrical, electronics and computer engineering (TAEECE), 2013 International Conference on. IEEE, pp 98–104

  21. Keegan N, Ji SY, Chaudhary A, Concolato C, Yu B, Jeong DH (2016) A survey of cloud-based network intrusion detection analysis. Hum Centric Comput Inf Sci 6(1):19

    Article  Google Scholar 

  22. Zarrabi A, Zarrabi A (2012) Internet intrusion detection system service in a cloud. Citeseer

  23. Varadharajan V, Tupakula U (2014) Security as a service model for cloud environment. IEEE Trans Netw Serv Manag 11(1):60–75

    Article  Google Scholar 

  24. Alharkan T, Martin P (2012) Idsaas: Intrusion detection system as a service in public clouds. In: Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012). IEEE Computer Society, pp 686–687

  25. Gul I, Hussain M (2011) Distributed cloud intrusion detection model. Int J Adv Sci Technol 34(38):135

    Google Scholar 

  26. Gupta S, Kumar P (2017) Profile and back off based distributed NIDS in cloud. Wirel Pers Commun 94(4):2879

    Article  Google Scholar 

  27. Wang Z, Zhu Y (2017) A centralized HIDS framework for private cloud. In: Software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD), 2017 18th IEEE/ACIS International Conference on. IEEE, pp 115–120

  28. Modi C, Patel D (2018) A feasible approach to intrusion detection in virtual network layer of cloud computing. Sādhanā 43(7):114

    Article  Google Scholar 

  29. Alruwaili FF, Gulliver A (2014) CCIPS: A cooperative intrusion detection and prevention framework for cloud services. Int J Latest Trends Comput 4(4):151–158

    Google Scholar 

  30. Ficco M, Tasquier L, Aversa R (2013) Intrusion detection in cloud computing. In: P2P, parallel, grid, cloud and internet computing (3PGCIC), 2013 Eighth International Conference on. IEEE, pp 276–283

  31. Zargar ST, Takabi H, Joshi JB (2011) DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments. In: Collaborative computing: networking, applications and worksharing (CollaborateCom), 2011 7th International Conference on. IEEE, pp 332–341

  32. Lo CC, Huang CC, Ku J (2010) A cooperative intrusion detection system framework for cloud computing networks. In: Parallel processing workshops (ICPPW), 2010 39th International Conference on. IEEE, pp 280–284

  33. Service name and transport protocol port number registry. Inter Asterisk Exchange (IAX) Parameters.https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml

  34. Snort. Official snort ruleset covering the most emerging threats.https://www.snort.org/products. Online; Accessed 1 May 2017

  35. Breiman L (2001) Random forests. Mach Learn 45(1):5–32

    Article  Google Scholar 

  36. Kevric J, Jukic S, Subasi A (2017) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 28(1):1051–1058

    Article  Google Scholar 

  37. Man ND, Huh EN (2012) A collaborative intrusion detection system framework for cloud computing. In Proceedings of the International Conference on IT Convergence and Security 2011. Springer, pp 91–109

  38. Yan Y, Xu B, Gu Z (2008) Automatic service composition using and/or graph. In: E-commerce technology and the fifth IEEE conference on enterprise computing, e-commerce and e-services, 2008 10th IEEE Conference on. IEEE, pp 335–338

  39. Function mathematics.https://en.wikipedia.org/wiki/Function_mathematics. Accessed 30 Mar 2018

  40. Power set.https://en.wikipedia.org/wiki/Power_set. Accessed 30 Jan 2018

  41. Amazon virtual private cloud (vpc).https://aws.amazon.com/vpc. Accessed 1 May 2016

  42. Snort. Snort-network intrusion detection and prevention system.https://www.snort.org/. Online; Accessed 1 May 2015

  43. Microsoft sql server.https://www.microsoft.com. Accessed 1 Jan 2017

  44. iperf-the ultimate speed test tool for tcp, udp and sctp.https://iperf.fr/iperf-download.php/. Accessed 2 Oct 2016

  45. Chapade S, Pandey K, Bhade D (2013) Securing cloud servers against flooding based DDoS attacks. In: Communication systems and network technologies (CSNT), 2013 International Conference on. IEEE, pp 524–528

Download references

Author information

Authors and Affiliations

  1. École de technologie supérieure, 1100 Notre-Dame St W, Montréal, QC, H3C 1K3, Canada

    Mohamed Hawedi & Chamseddine Talhi

  2. École polytechnique de Montréal, 2900 Edouard Montpetit Blvd, Montréal, QC, H3T 1J4, Canada

    Hanifa Boucheneb

Authors
  1. Mohamed Hawedi

    You can also search for this author inPubMed Google Scholar

  2. Chamseddine Talhi

    You can also search for this author inPubMed Google Scholar

  3. Hanifa Boucheneb

    You can also search for this author inPubMed Google Scholar

Corresponding author

Correspondence toMohamed Hawedi.

Rights and permissions

About this article

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Advertisement


[8]ページ先頭

©2009-2025 Movatter.jp