CFP last date
16 December 2024
Call for Paper
January Edition
IJAIS solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 16 December 2024

Submit your paper
Know more
Reseach Article

Intrusion Detection System for DoS Attack in Cloud

by Mishti D. Samani, Miren Karamta, Jitendra Bhatia, M.B. Potdar
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 10 - Number 5
Year of Publication: 2016
Authors: Mishti D. Samani, Miren Karamta, Jitendra Bhatia, M.B. Potdar
10.5120/ijais2016451503

Mishti D. Samani, Miren Karamta, Jitendra Bhatia, M.B. Potdar . Intrusion Detection System for DoS Attack in Cloud. International Journal of Applied Information Systems. 10, 5 ( February 2016), 18-26. DOI=10.5120/ijais2016451503

@article{ 10.5120/ijais2016451503,
author = { Mishti D. Samani, Miren Karamta, Jitendra Bhatia, M.B. Potdar },
title = { Intrusion Detection System for DoS Attack in Cloud },
journal = { International Journal of Applied Information Systems },
issue_date = { February 2016 },
volume = { 10 },
number = { 5 },
month = { February },
year = { 2016 },
issn = { 2249-0868 },
pages = { 18-26 },
numpages = {9},
url = { https://www.ijais.org/archives/volume10/number5/862-2016451503/ },
doi = { 10.5120/ijais2016451503 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:02:35.063351+05:30
%A Mishti D. Samani
%A Miren Karamta
%A Jitendra Bhatia
%A M.B. Potdar
%T Intrusion Detection System for DoS Attack in Cloud
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 10
%N 5
%P 18-26
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Open and distributed nature of cloud, vulnerability of internet, different limitations of cloud service models are some of key features for the attraction of various attackers. One of the security concern for cloud is denial of service attack. Due to effect of this attack, legitimate users request are not processed. A Defense mechanism is required to secure network from such sophisticated attacks. Intrusion detection is mainly used to identify attacks and log the reports. Intrusion detection system is proposed based on knowledge multi- threaded system. Single technique is not sufficient enough to detect such attacks. Multithreaded knowledge based IDS has been proposed to detect DOS attacks.

References
  1. Rajendran, Praveen Kumar, B. Muthukumar, and G. Nagarajan. "Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach." Procedia Computer Science 48 (2015): 325-329.
  2. Choo, Kim-Kwang Raymond. "Cloud computing: challenges and future directions." (2010):
  3. Modi, Chirag, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, and Muttukrishnan Rajarajan. "A survey of intrusion detection techniques in cloud." Journal of Network and Computer Applications 36, no. 1 (2013): 42-57.
  4. Patel, Ahmed, Mona Taghavi, Kaveh Bakhtiyari, and Joaquim Celestino Júnior. "An intrusion detection and prevention system in cloud computing: A systematic review." Journal of Network and Computer Applications 36, no. 1 (2013): 25-41.
  5. Deka, Rup Kumar, Kausthav Pratim Kalita, D. K. Bhattacharya, and Jugal K. Kalita. "Network defense: Approaches, methods and techniques." Journal of Network and Computer Applications 57 (2015): 71-84.
  6. Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud computing: Opportunities and challenges." Information Sciences 305 (2015): 357-383.
  7. Deshmukh, Rashmi V., and Kailas K. Devadkar. "Understanding DDoS Attack & its Effect in Cloud Environment." Procedia Computer Science 49 (2015): 202-210.
  8. Jabez, J., and B. Muthukumar. "Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach." Procedia Computer Science 48 (2015): 338-346.
  9. Hosseini, BS Mojtaba, Behnam Amiri, Mahboubeh Mirzabagheri, and Yong Shi. "A New Intrusion Detection Approach using PSO based Multiple Criteria Linear Programming." Procedia Computer Science 55 (2015): 231-237.
  10. Che, Jianhua, Yamin Duan, Tao Zhang, and Jie Fan. "Study on the security models and strategies of cloud computing." Procedia Engineering 23 (2011): 586-593.
  11. Fatema, Kaniz, Vincent C. Emeakaroha, Philip D. Healy, John P. Morrison, and Theo Lynn. "A survey of Cloud monitoring tools: Taxonomy, capabilities and objectives." Journal of Parallel and Distributed Computing 74, no. 10 (2014): 2918-2933.
  12. Liao, Hung-Jen, Chun-Hung Richard Lin, Ying-Chih Lin, and Kuang-Yuan Tung. "Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications 36, no. 1 (2013): 16-24.
  13. Di Pietro, Roberto, and Luigi V. Mancini. Intrusion detection systems. Vol. 38. Springer Science & Business Media, 2008.
  14. Zissis, Dimitrios, and Dimitrios Lekkas. "Addressing cloud computing security issues." Future Generation computer systems 28, no. 3 (2012): 583-592.
  15. Narwane, S. V., and S. L. Vaikol. "Intrusion Detection System in Cloud Computing Environment." In InInternational Conference on Advances in Communication and Computing Technologies (ICACACT). 2012.
  16. Mohod, Akash G., and Satish J. Alaspurkar. "Analysis of IDS for Cloud Computing." International Journal of Application or Innovation in Engineering & Management (IJAIEM) Vol 2: 344-349.
  17. Subashini, Subashini, and V. Kavitha. "A survey on security issues in service delivery models of cloud computing." Journal of network and computer applications 34, no. 1 (2011): 1-11.
  18. Mazzariello, Claudio, Roberto Bifulco, and Roberto Canonico. "Integrating a network IDS into an open source cloud computing environment." In Information Assurance and Security (IAS), 2010 Sixth International Conference on, pp. 265-270. IEEE, 2010.
  19. Kene, Snehal G., and Deepti P. Theng. "A review on intrusion detection techniques for cloud computing and security challenges." In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on, pp. 227-232. IEEE, 2015.
  20. Girma, Anteneh, Moses Garuba, Jiang Li, and Chunmei Liu. "Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment." In Information Technology-New Generations (ITNG), 2015 12th International Conference on, pp. 212-217. IEEE, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing sophisticated attacks multithreaded anomaly detection firewall DDOS SaaS PaaS IaaS.