Skip to main content

2018 | OriginalPaper | Buchkapitel

Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud-Based Environment

verfasst von : Priya Oberoi, Sumit Mittal

Erschienen in: Cyber Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has gained an extreme importance nowadays. Every organization is getting attracted toward the Cloud computing due to its attractive features like cost saving, adaptability, etc. Although it offers the attractive features but still Cloud threats need great consideration. The insider threat is critically challenging in the Cloud-based environments. In order to mitigate from insider attacks in Clouds, the use of Intrusion detection system (IDS) is quite challenging. Every type of IDS has different methods of attack detection. So, single IDS cannot guarantee the protection from all types of attacks. Thus, in this paper, we have studied the various types of IDS and their features which made them either suitable or unsuitable for cloud computing. Also on the basis of review, required features for the Cloud-based IDS are identified.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Yusop ZM, Abawajy JH (2014) Analysis of insiders attack mitigation strategies. Procedia Soc Behav Sci 129:581–591 CrossRef Yusop ZM, Abawajy JH (2014) Analysis of insiders attack mitigation strategies. Procedia Soc Behav Sci 129:581–591 CrossRef
5.
Zurück zum Zitat Patel A, Taghavi M, Bakhtiyari K, Júnior JC (2013) An intrusion detection and prevention system in cloud computing: a systematic review. J Netw Comput Appl 36(1):25–41CrossRef Patel A, Taghavi M, Bakhtiyari K, Júnior JC (2013) An intrusion detection and prevention system in cloud computing: a systematic review. J Netw Comput Appl 36(1):25–41CrossRef
6.
Zurück zum Zitat Kholidy HA, Baiardi F (2012) CIDS: a framework for intrusion detection in cloud, systems. In: 2012 ninth international conference on information technology—new Generations, 978-0-7695-4654-4/12 $26.00 © 2012 IEEE Kholidy HA, Baiardi F (2012) CIDS: a framework for intrusion detection in cloud, systems. In: 2012 ninth international conference on information technology—new Generations, 978-0-7695-4654-4/12 $26.00 © 2012 IEEE
7.
Zurück zum Zitat Khorshed MT, Ali ABMS, Wasimi SA (2011) Monitoring insiders activities in cloud computing using rule based learning. In: IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom-2011), 16–18 Nov 2011 Khorshed MT, Ali ABMS, Wasimi SA (2011) Monitoring insiders activities in cloud computing using rule based learning. In: IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom-2011), 16–18 Nov 2011
8.
Zurück zum Zitat Gul I, Hussain M (2011) Distributed cloud intrusion detection model. Int J Adv Sci Technol 34 Gul I, Hussain M (2011) Distributed cloud intrusion detection model. Int J Adv Sci Technol 34
9.
Zurück zum Zitat Schmidt M, Baumgartner L, Graubner P, Bock D, Freisleben B (2011) Malware detection and kernel rootkit prevention in cloud computing environments. In: 19th Euromicro international conference on parallel, distributed and network-based processing (PDP-2011), pp 603–610, 9–11 Feb 2011 Schmidt M, Baumgartner L, Graubner P, Bock D, Freisleben B (2011) Malware detection and kernel rootkit prevention in cloud computing environments. In: 19th Euromicro international conference on parallel, distributed and network-based processing (PDP-2011), pp 603–610, 9–11 Feb 2011
10.
Zurück zum Zitat Nkosi L, Tarwireyi P, Adigun M (2013) Insider threat detection model for the cloud. 978-1-4799-0808-0/13/$31.00 ©2013 IEEE Nkosi L, Tarwireyi P, Adigun M (2013) Insider threat detection model for the cloud. 978-1-4799-0808-0/13/$31.00 ©2013 IEEE
11.
Zurück zum Zitat Yang S-F, Chen W-Y, Wang Y-T (2011) ICAS: an inter-VM IDS log cloud analysis system. In: IEEE international conference on cloud computing and intelligence systems (CCIS-2011), 15–17 Sept 2011 Yang S-F, Chen W-Y, Wang Y-T (2011) ICAS: an inter-VM IDS log cloud analysis system. In: IEEE international conference on cloud computing and intelligence systems (CCIS-2011), 15–17 Sept 2011
12.
Zurück zum Zitat Ficco M, Tasquier L, Aversa R (2013) Intrusion detection in cloud computing. In: 18th international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC-2013), pp 276–283, 28–30 Oct 2013 Ficco M, Tasquier L, Aversa R (2013) Intrusion detection in cloud computing. In: 18th international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC-2013), pp 276–283, 28–30 Oct 2013
14.
Zurück zum Zitat Kandias M, Virvilis N, Gritzalis D (2013) The insider threat in cloud computing. In: Critical information infrastructure security. Lecture notes in computer science, vol 6983. Springer, Berlin, pp 93–103 Kandias M, Virvilis N, Gritzalis D (2013) The insider threat in cloud computing. In: Critical information infrastructure security. Lecture notes in computer science, vol 6983. Springer, Berlin, pp 93–103
15.
Zurück zum Zitat Mehmood Y, Habiba U, Muhammad AS, Masood R (2013) Intrusion detection system in cloud computing: challenges and opportunities. In: 2nd national conference on information assurance (NCIA), pp 59–66, 978-1-4799-1288-9/13©2013 IEEE Mehmood Y, Habiba U, Muhammad AS, Masood R (2013) Intrusion detection system in cloud computing: challenges and opportunities. In: 2nd national conference on information assurance (NCIA), pp 59–66, 978-1-4799-1288-9/13©2013 IEEE
16.
Zurück zum Zitat Gupta S, Kumar P, Sardana A, Abraham A, A fingerprinting system calls approach for intrusion detection in cloud environment. In: 4th international conference computational aspects of social networks (CASoN-2012), published by IEEE, pp 309–314 Gupta S, Kumar P, Sardana A, Abraham A, A fingerprinting system calls approach for intrusion detection in cloud environment. In: 4th international conference computational aspects of social networks (CASoN-2012), published by IEEE, pp 309–314
17.
Zurück zum Zitat Martinez-Moyano IJ, Rich E, Conrad S, Andersen DF, Stewart TR (2008) A behavioral theory of insider threat risks: a system dynamics approach. ACM Trans Modeling Comput Simul 18(2):7.1–7.27 Martinez-Moyano IJ, Rich E, Conrad S, Andersen DF, Stewart TR (2008) A behavioral theory of insider threat risks: a system dynamics approach. ACM Trans Modeling Comput Simul 18(2):7.1–7.27
18.
Zurück zum Zitat Dileep Kumar G, Morarjee K (2014) Insider data theft detection using decoy and user behavior profile. Int J Res Comput Appl Robot 2(2):51–55. ISSN: 2320-7345. www.ijrcar.in Dileep Kumar G, Morarjee K (2014) Insider data theft detection using decoy and user behavior profile. Int J Res Comput Appl Robot 2(2):51–55. ISSN: 2320-7345. www.​ijrcar.​in
19.
Zurück zum Zitat Young WT, Goldberg HG, Memory A, Sartain JF, Senator TE (2013) Use of domain knowledge to detect insider threats in computer activities. IEEE security and privacy workshops Young WT, Goldberg HG, Memory A, Sartain JF, Senator TE (2013) Use of domain knowledge to detect insider threats in computer activities. IEEE security and privacy workshops
20.
Zurück zum Zitat Wongthai W, Rocha F, Van Moorsel A (2013) Logging solutions to mitigate risks associated with threats in infrastructure as a service cloud. In: International conference on cloud computing and big data, pp 163–170 Wongthai W, Rocha F, Van Moorsel A (2013) Logging solutions to mitigate risks associated with threats in infrastructure as a service cloud. In: International conference on cloud computing and big data, pp 163–170
21.
Zurück zum Zitat Claycomb WR, Nicoll A (2012) Insider threats to cloud computing directions for new research challenges. In: Proceedings of the 2012 IEEE 36th annual computer software and applications conference, pp 387–394. IEEE Computer Society, Washington, DC, USA ©2012 Claycomb WR, Nicoll A (2012) Insider threats to cloud computing directions for new research challenges. In: Proceedings of the 2012 IEEE 36th annual computer software and applications conference, pp 387–394. IEEE Computer Society, Washington, DC, USA ©2012
Metadaten
Titel
Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud-Based Environment
verfasst von
Priya Oberoi
Sumit Mittal
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_11