Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

23.09.2016

Profile and Back Off Based Distributed NIDS in Cloud

verfasst von: Sanchika Gupta, Padam Kumar

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud security is a major concern these days. Out of the various attacks over Cloud the one which is very specific and consistently launched is DDoS. Current state of art solutions for detection of DDoS attacks in Cloud consume a lot of computational resources in performing per packet attack signature detection. As and when Cloud scales this will result in more resources being utilized for providing DDoS attack detection in Cloud eventually decreasing the amount of resources from the effective pool that can be allocated to its clients. We have utilized the underlying fact that during DDoS, attack packets are sent at a very heavy rate and hence proposed a profiling and back off based detection strategy for detecting DDoS attacks in Cloud. The solution provides lowest resource requirements at the same detection speed. The proposed solution is validated using DARPA dataset and has been thoroughly tested in multiple set of experimentations at client VM’s in Cloud. It has provided a 100 % accuracy in DDoS attack detection with almost 32 times savior of computational resources at near to same detection speed compared to traditional per packet based NIDS at a back off detection value of T = 32.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gupta, S., & Kumar, P. (2013). Taxonomy of cloud security. International Journal of Computer Science, Engineering and Applications, 3(5), 20.CrossRef Gupta, S., & Kumar, P. (2013). Taxonomy of cloud security. International Journal of Computer Science, Engineering and Applications, 3(5), 20.CrossRef
2.
Zurück zum Zitat Buyya, R., Chee Shin, Y., & Venugopal, S. (2008). Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities. In 10th IEEE international conference on high performance computing and communications. HPCC ‘08, Dallan (pp. 5–13). Buyya, R., Chee Shin, Y., & Venugopal, S. (2008). Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities. In 10th IEEE international conference on high performance computing and communications. HPCC ‘08, Dallan (pp. 5–13).
3.
Zurück zum Zitat Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599–616.CrossRef Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599–616.CrossRef
4.
Zurück zum Zitat Mazzariello, C., Bifulco, R., & Canonico, R. (2010). Integrating a network IDS into an open source Cloud Computing environment. In 2010 Sixth international conference on information assurance and security (IAS), Atlanta, GA (pp. 265–270). Mazzariello, C., Bifulco, R., & Canonico, R. (2010). Integrating a network IDS into an open source Cloud Computing environment. In 2010 Sixth international conference on information assurance and security (IAS), Atlanta, GA (pp. 265–270).
5.
Zurück zum Zitat Jansen, W., & Grance, T. (2011). NIST issues cloud computing guidelines for managing security and privacy (Vol. 800-144). Gaithersburg, MD: Computer Security Division Information Technology Laboratory National Institute of Standards and Technology. Jansen, W., & Grance, T. (2011). NIST issues cloud computing guidelines for managing security and privacy (Vol. 800-144). Gaithersburg, MD: Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
7.
Zurück zum Zitat Holt, A., & Weiss, K. (2011). Cloud Computing takes off (Vol. 1). New York: Morgan Stanley. Holt, A., & Weiss, K. (2011). Cloud Computing takes off (Vol. 1). New York: Morgan Stanley.
8.
Zurück zum Zitat Stephen, C., Tyler, B., Mukul, G., & Patrick, S. (2013). Targeted attacks and opportunistic hacks (Vol. 1). Report, Alert Logic, Yorktown. Stephen, C., Tyler, B., Mukul, G., & Patrick, S. (2013). Targeted attacks and opportunistic hacks (Vol. 1). Report, Alert Logic, Yorktown.
9.
Zurück zum Zitat Stallings, W. (2007). Network security essentials: Applications and standards (pp. 26–351). Noida: Pearson Education India. Stallings, W. (2007). Network security essentials: Applications and standards (pp. 26–351). Noida: Pearson Education India.
10.
Zurück zum Zitat Lei, Z., Shui, Y., Di, W., & Watters, P. (2011). A survey on latest botnet attack and defense. In 2011 IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom), Changsha (pp. 53–60). Lei, Z., Shui, Y., Di, W., & Watters, P. (2011). A survey on latest botnet attack and defense. In 2011 IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom), Changsha (pp. 53–60).
12.
Zurück zum Zitat Gupta, S., Kumar, P., Sardana, A., & Abraham, A. (2012). A secure and lightweight approach for critical data security in cloud. In 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), Sao Carlos (pp. 315–320). Gupta, S., Kumar, P., Sardana, A., & Abraham, A. (2012). A secure and lightweight approach for critical data security in cloud. In 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), Sao Carlos (pp. 315–320).
13.
Zurück zum Zitat Hubballi, N., Biswas, S., & Nandi, S. (2013). Towards reducing false alarms in network intrusion detection systems with data summarization technique. Security and Communication Networks, 6(3), 275–285.CrossRef Hubballi, N., Biswas, S., & Nandi, S. (2013). Towards reducing false alarms in network intrusion detection systems with data summarization technique. Security and Communication Networks, 6(3), 275–285.CrossRef
14.
Zurück zum Zitat Husain, M. I. (2012). A holistic approach to lightweight data security in embedded cloud computing. New York, NY: State University of New York at Buffalo. Husain, M. I. (2012). A holistic approach to lightweight data security in embedded cloud computing. New York, NY: State University of New York at Buffalo.
15.
Zurück zum Zitat Qin, L., Guojun, W., & Jie, W. (2009). An efficient privacy preserving keyword search scheme in cloud computing. In International Conference on Computational Science and Engineering, 2009. CSE ‘09, Vancouver, BC (pp. 715–720). Qin, L., Guojun, W., & Jie, W. (2009). An efficient privacy preserving keyword search scheme in cloud computing. In International Conference on Computational Science and Engineering, 2009. CSE ‘09, Vancouver, BC (pp. 715–720).
16.
Zurück zum Zitat Chi-Chun, L., Chun-Chieh, H., & Ku, J. (2010). A cooperative intrusion detection system framework for cloud computing networks. In 2010 39th international conference on parallel processing workshops (ICPPW), San Diego, CA (pp. 280–284). Chi-Chun, L., Chun-Chieh, H., & Ku, J. (2010). A cooperative intrusion detection system framework for cloud computing networks. In 2010 39th international conference on parallel processing workshops (ICPPW), San Diego, CA (pp. 280–284).
18.
Zurück zum Zitat Qi, C., Wenmin, L., Wanchun, D., & Shui, Y. (2011). CBF: A packet filtering method for DDoS attack defense in cloud environment. In 2011 IEEE Ninth international conference on dependable, autonomic and secure computing (DASC), Sydney, NSW (pp. 427–434). Qi, C., Wenmin, L., Wanchun, D., & Shui, Y. (2011). CBF: A packet filtering method for DDoS attack defense in cloud environment. In 2011 IEEE Ninth international conference on dependable, autonomic and secure computing (DASC), Sydney, NSW (pp. 427–434).
19.
Zurück zum Zitat Jin, H., Xiang, G., Zou, D., Wu, S., Zhao, F., Li, M., et al. (2011). A VMM-based intrusion prevention system in cloud computing environment. The Journal of Supercomputing, 1, 1–19. Jin, H., Xiang, G., Zou, D., Wu, S., Zhao, F., Li, M., et al. (2011). A VMM-based intrusion prevention system in cloud computing environment. The Journal of Supercomputing, 1, 1–19.
21.
Zurück zum Zitat Smallwood, D., & Vance, A. (2011) Intrusion analysis with deep packet inspection: Increasing efficiency of packet based investigations. In 2011 international conference on cloud and service computing (CSC), Hong Kong (pp. 342–347). Smallwood, D., & Vance, A. (2011) Intrusion analysis with deep packet inspection: Increasing efficiency of packet based investigations. In 2011 international conference on cloud and service computing (CSC), Hong Kong (pp. 342–347).
22.
Zurück zum Zitat Dhage, S. N., Meshram, B. B., Rawat, R., Padawe, S., Paingaokar, M., & Misra, A. (2011). Intrusion detection system in cloud computing environment. In Proceedings of the International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India (pp. 235–239). Dhage, S. N., Meshram, B. B., Rawat, R., Padawe, S., Paingaokar, M., & Misra, A. (2011). Intrusion detection system in cloud computing environment. In Proceedings of the International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India (pp. 235–239).
23.
Zurück zum Zitat Gul, I., & Hussain, M. (2011). Distributed cloud intrusion detection model. International Journal of Advanced Science and Technology, 34, 71–81. Gul, I., & Hussain, M. (2011). Distributed cloud intrusion detection model. International Journal of Advanced Science and Technology, 34, 71–81.
24.
Zurück zum Zitat Joshi, B., Vijayan, A. S., & Joshi, B. K. (2012) Securing cloud computing environment against DDoS attacks. In 2012 international conference on computer communication and informatics (ICCCI), Coimbatore, India (pp. 1–5). Joshi, B., Vijayan, A. S., & Joshi, B. K. (2012) Securing cloud computing environment against DDoS attacks. In 2012 international conference on computer communication and informatics (ICCCI), Coimbatore, India (pp. 1–5).
25.
Zurück zum Zitat Lanjuan, Y., Tao, Z., Jinyu, S., JinShuang, W., & Ping, C. (2012) Defense of DDoS attack for cloud computing. In 2012 IEEE international conference on computer science and automation engineering (CSAE), Zhangjiajie, China (pp. 626–629). Lanjuan, Y., Tao, Z., Jinyu, S., JinShuang, W., & Ping, C. (2012) Defense of DDoS attack for cloud computing. In 2012 IEEE international conference on computer science and automation engineering (CSAE), Zhangjiajie, China (pp. 626–629).
26.
Zurück zum Zitat Zhuang, W., Gui, X., Huang Ru, W., & Yu, S. (2012) TCP DDOS attack detection on the host in the KVM virtual machine environment. In 2012 IEEE/ACIS 11th international conference on computer and information science (ICIS), Shanghai (pp. 62–67). Zhuang, W., Gui, X., Huang Ru, W., & Yu, S. (2012) TCP DDOS attack detection on the host in the KVM virtual machine environment. In 2012 IEEE/ACIS 11th international conference on computer and information science (ICIS), Shanghai (pp. 62–67).
27.
Zurück zum Zitat Borisaniya, B., Patel, A., Patel, D., Patel, H., Dimitrakos, T., Moona, R., et al. (2012). Incorporating honeypot for intrusion detection in cloud infrastructure trust management VI. IFIP Advances in Information and Communication Technology (pp. 84–96). Boston: Springer. Borisaniya, B., Patel, A., Patel, D., Patel, H., Dimitrakos, T., Moona, R., et al. (2012). Incorporating honeypot for intrusion detection in cloud infrastructure trust management VI. IFIP Advances in Information and Communication Technology (pp. 84–96). Boston: Springer.
28.
Zurück zum Zitat Modi, C. N., Patel, D. R., Patel, A., & Rajarajan, M. (2012). Integrating signature apriori based network intrusion detection system (NIDS) in cloud computing. Procedia Technology, 6(1), 905–912.CrossRef Modi, C. N., Patel, D. R., Patel, A., & Rajarajan, M. (2012). Integrating signature apriori based network intrusion detection system (NIDS) in cloud computing. Procedia Technology, 6(1), 905–912.CrossRef
29.
Zurück zum Zitat Anitha, E., & Malliga, S. (2013). A packet marking approach to protect cloud environment against DDoS attacks. In 2013 international conference on information communication and embedded systems (ICICES), Chennai, India (pp. 367–370). Anitha, E., & Malliga, S. (2013). A packet marking approach to protect cloud environment against DDoS attacks. In 2013 international conference on information communication and embedded systems (ICICES), Chennai, India (pp. 367–370).
30.
Zurück zum Zitat Ismail, M. N., Aborujilah, A., Musa, S., & Shahzad, A. (2013) “Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. In Proceedings of the 7th international conference on ubiquitous information management and communication, Kota Kinabalu, Malaysia (pp. 1–6). Ismail, M. N., Aborujilah, A., Musa, S., & Shahzad, A. (2013) “Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. In Proceedings of the 7th international conference on ubiquitous information management and communication, Kota Kinabalu, Malaysia (pp. 1–6).
31.
Zurück zum Zitat Choi, J., Choi, C., Ko, B., & Kim, P. (2014). A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Computing, 18(9), 1697–1703.CrossRef Choi, J., Choi, C., Ko, B., & Kim, P. (2014). A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Computing, 18(9), 1697–1703.CrossRef
32.
Zurück zum Zitat Rahman, M., & Cheung, W. M. (2014). A novel cloud computing security model to detect and prevent DoS and DDoS attack. International Journal of Advanced Computer Science and Applications, 5(6), 119–122.CrossRef Rahman, M., & Cheung, W. M. (2014). A novel cloud computing security model to detect and prevent DoS and DDoS attack. International Journal of Advanced Computer Science and Applications, 5(6), 119–122.CrossRef
33.
Zurück zum Zitat Miao, R., Yu, M. & Jain, N. (2014). NIMBUS: Cloud-scale attack detection and mitigation. In Proceedings of the 2014 ACM conference on SIGCOMM, Chicago, Illinois, USA (pp. 121–122). Miao, R., Yu, M. & Jain, N. (2014). NIMBUS: Cloud-scale attack detection and mitigation. In Proceedings of the 2014 ACM conference on SIGCOMM, Chicago, Illinois, USA (pp. 121–122).
34.
Zurück zum Zitat Shamsolmoali, P., Alam, M. A., & Biswas, R. (2014). C2DF: High rate DDOS filtering method in cloud computing. International Journal of Computer Network and Information Security, 9(2014), 43–50.CrossRef Shamsolmoali, P., Alam, M. A., & Biswas, R. (2014). C2DF: High rate DDOS filtering method in cloud computing. International Journal of Computer Network and Information Security, 9(2014), 43–50.CrossRef
35.
Zurück zum Zitat Fei, X., Fangming, L., Hai, J., & Vasilakos, A. V. (2014). Managing performance overhead of virtual machines in cloud computing: A survey, state of the art, and future directions. Proceedings of the IEEE, 102(1), 11–31.CrossRef Fei, X., Fangming, L., Hai, J., & Vasilakos, A. V. (2014). Managing performance overhead of virtual machines in cloud computing: A survey, state of the art, and future directions. Proceedings of the IEEE, 102(1), 11–31.CrossRef
36.
Zurück zum Zitat Gupta, S., Sardana, A., & Kumar, P. (2012). A light weight centralized file monitoring approach for securing files in cloud environment. In The 7th international conference for internet technology and secured transactions (ICITST-2012) (pp. 382–387). London: UK. Gupta, S., Sardana, A., & Kumar, P. (2012). A light weight centralized file monitoring approach for securing files in cloud environment. In The 7th international conference for internet technology and secured transactions (ICITST-2012) (pp. 382–387). London: UK.
Metadaten
Titel
Profile and Back Off Based Distributed NIDS in Cloud
verfasst von
Sanchika Gupta
Padam Kumar
Publikationsdatum
23.09.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3753-3

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt