z-logo
Premium
HIDCC: A hybrid intrusion detection approach in cloud computing
Author(s) -
Hatef Mohammad Amin,
Shaker Vahid,
Jabbarpour Mohammad Reza,
Jung Jason,
Zarrabi Houman
Publication year - 2017
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.4171
Subject(s) - cloud computing , intrusion detection system , computer science , software deployment , distributed computing , reliability (semiconductor) , computer security , operating system , power (physics) , physics , quantum mechanics
Summary The rapid growth of distributed computing systems that heavily communicate and interact with each other has raised the importance of confrontation against cyber intruders, attackers, and subversives. With respect to the emergence of cloud computing and its deployment all over the world, and because of its distributed and decentralized nature, a special security requirement is needed to protect this paradigm. Intrusion detection systems could differentiate usual and unusual behaviors by means of supervising, verifying, and controlling the configurations, log files, network traffic, user activities, and even the actions of different processes by which they could add new security dimensions to the cloud computing systems. The position of the intrusion detection mechanisms in cloud computing systems as well as the applied algorithms in those mechanisms are the 2 main factors in which many researches have focused on. The goal of those researches is to uncover intrusions as much as possible and to increase the rate and accuracy of detections while reducing the false warnings. Those solutions, however, mainly have high computational loads, low accuracy, and high implementation costs. In this paper, we present a comprehensive and accurate solution to detect and prevent intrusions in cloud computing systems by using a hybrid method, called HIDCC. The implementation results of the proposed method show that the intrusion coverage, intrusion detection accuracy, reliability, and availability in cloud computing systems are considerably increased, and false warnings are significantly reduced.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here