Multi-tenant intrusion detection system for public cloud (MTIDS)

@article{Hawedi2018MultitenantID,
  title={Multi-tenant intrusion detection system for public cloud (MTIDS)},
  author={Mohamed Hawedi and Chamseddine Talhi and Hanifa Boucheneb},
  journal={The Journal of Supercomputing},
  year={2018},
  volume={74},
  pages={5199-5230}
}
Cloud computing is an innovative paradigm technology that is known for its versatility. It provides many creative services as requested, and it is both cost efficient and reliable. More specifically, cloud computing provides an opportunity for tenants to reduce cost and raise effectiveness by offering an alternative method of service utilization. Although these services are easily provided to tenants on demand with minor infrastructure investment, they are significantly exposed to intrusion… Expand
Cloud services security-driven evaluation for multiple tenants
TLDR
A multi-tenant cloud services evaluation framework, whereby service selection is carried out per group of tenants that can belong to different service classes, rather than per a single user, to realistically represent the heterogeneity and uncertainty of security information. Expand
IDS-DL: A description language for detection system in cloud computing
TLDR
This work contributes to an unified framework by a conceptual meta-model of cloud-based detection systems, called meta-IDS, while helping the community to identify work on this topic and making it easier for researchers to find, identify and use existing solutions. Expand
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks
TLDR
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks that can achieve detection rate of 99.98%, accuracy of 96.35%, and can reduce false alarm rate upto 5.59% is proposed. Expand
Comparison of Hybrid Intrusion Detection System
TLDR
From a number of existing IDS-based studies, this paper intends to conduct a review with the aim that researchers who wish to develop hybrid-based IDS know which methods and architecture are best to be implemented. Expand
A Systematic Literature Review of Intrusion Detection System for Network Security: Research Trends, Datasets and Methods
Study on intrusion detection system (IDS) mostly allow network administrators to focus on development activities in terms of network security and making better use of resource. Many IDS datasets,Expand

References

SHOWING 1-10 OF 43 REFERENCES
CCIPS: A Cooperative Intrusion Detection and Prevention Framework for Cloud Services
With the recent emergence and rapid advancement of cloud computing infrastructure and services, outsourcing Information Technology (IT) and digital services to Cloud Providers (CPs) has becomeExpand
Security as a Service Model for Cloud Environment
TLDR
A security architecture that provides a flexible security as a service model that a cloud provider can offer as part of its infrastructure to its customers (tenants) to counteract these attacks. Expand
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments
  • S. Zargar, H. Takabi, J. Joshi
  • Computer Science
  • 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
  • 2011
TLDR
A distributed, Collaborative, and Data-driven Intrusion Detection and Prevention system (DCDIDP) to provide a holistic IDPS for all cloud service providers which collaborate with other peers in a distributed manner at different architectural levels to respond to attacks. Expand
A centralized HIDS framework for private cloud
  • Zhijian Wang, Y. Zhu
  • Computer Science
  • 2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
  • 2017
TLDR
This paper proposes a centralized host-based IDS framework to reduce the use of the resources for cloud computing, using logstash tool to collect the system logs from each virtual machine, and storing them into elasticsearch cluster centrally. Expand
Intrusion Detection in Cloud Computing
TLDR
This paper presents a distributed architecture for providing intrusion detection in Cloud Computing, using multiple distributed security components, which can be used to perform complex event correlation analysis. Expand
A Cooperative Intrusion Detection System Framework for Cloud Computing Networks
TLDR
The implementation results indicate that the proposed cooperative IDS system could resist DoS attack and only increases little computation effort compared with pure Snort based IDS but prevents the system from single point of failure attack. Expand
A Collaborative Intrusion Detection System Framework for Cloud Computing
TLDR
To counter a variety of attacks, especially large-scale coordinated attacks, a framework of Collaborative Intrusion Detection System (IDS) is proposed that could reduce the impact of these kinds of attacks through providing timely notifications about new intrusions to Cloud users’ systems. Expand
Proxy Network Intrusion Detection System for cloud computing
  • U. Oktay, O. K. Sahingoz
  • Engineering
  • 2013 The International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE)
  • 2013
Cloud computing is the state of the art approach of information technologies. While migrating from conventional data centers to cloud computing paradigm, administrators have to consider costs.Expand
Securing Cloud Servers Against Flooding Based DDOS Attacks
TLDR
This paper presents a simple distance estimation based technique to detect and prevent the cloud from flooding based DDoS attack and thereby protect other servers and users from its adverse effects. Expand
Profile and Back Off Based Distributed NIDS in Cloud
TLDR
This work has utilized the underlying fact that during DDoS, attack packets are sent at a very heavy rate and hence proposed a profiling and back off based detection strategy for detecting DDoS attacks in Cloud that provides lowest resource requirements at the same detection speed. Expand
...
1
2
3
4
5
...