Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

February Edition 2019

International Journal of Applied Information Systems solicits high quality original research papers for the January 2019 Edition of the journal. The last date of research paper submission is January 15, 2019.

Intrusion Detection System for DoS Attack in Cloud

Mishti D. Samani, Miren Karamta, Jitendra Bhatia, M.B. Potdar. Published in Security

International Journal of Applied Information Systems
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Mishti D. Samani, Miren Karamta, Jitendra Bhatia, M.B. Potdar
10.5120/ijais2016451503
Download full text
  1. Mishti D Samani, Miren Karamta, Jitendra Bhatia and M B Potdar. Article: Intrusion Detection System for DoS Attack in Cloud. International Journal of Applied Information Systems 10(5):18-26, February 2016. BibTeX

    @article{key:article,
    	author = "Mishti D. Samani and Miren Karamta and Jitendra Bhatia and M.B. Potdar",
    	title = "Article: Intrusion Detection System for DoS Attack in Cloud",
    	journal = "International Journal of Applied Information Systems",
    	year = 2016,
    	volume = 10,
    	number = 5,
    	pages = "18-26",
    	month = "February",
    	note = "Published by Foundation of Computer Science (FCS), NY, USA"
    }
    

Abstract

Open and distributed nature of cloud, vulnerability of internet, different limitations of cloud service models are some of key features for the attraction of various attackers. One of the security concern for cloud is denial of service attack. Due to effect of this attack, legitimate users request are not processed. A Defense mechanism is required to secure network from such sophisticated attacks. Intrusion detection is mainly used to identify attacks and log the reports. Intrusion detection system is proposed based on knowledge multi- threaded system. Single technique is not sufficient enough to detect such attacks. Multithreaded knowledge based IDS has been proposed to detect DOS attacks.

Reference

  1. Rajendran, Praveen Kumar, B. Muthukumar, and G. Nagarajan. "Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach." Procedia Computer Science 48 (2015): 325-329.
  2. Choo, Kim-Kwang Raymond. "Cloud computing: challenges and future directions." (2010):
  3. Modi, Chirag, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, and Muttukrishnan Rajarajan. "A survey of intrusion detection techniques in cloud." Journal of Network and Computer Applications 36, no. 1 (2013): 42-57.
  4. Patel, Ahmed, Mona Taghavi, Kaveh Bakhtiyari, and Joaquim Celestino Júnior. "An intrusion detection and prevention system in cloud computing: A systematic review." Journal of Network and Computer Applications 36, no. 1 (2013): 25-41.
  5. Deka, Rup Kumar, Kausthav Pratim Kalita, D. K. Bhattacharya, and Jugal K. Kalita. "Network defense: Approaches, methods and techniques." Journal of Network and Computer Applications 57 (2015): 71-84.
  6. Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in cloud computing: Opportunities and challenges." Information Sciences 305 (2015): 357-383.
  7. Deshmukh, Rashmi V., and Kailas K. Devadkar. "Understanding DDoS Attack & its Effect in Cloud Environment." Procedia Computer Science 49 (2015): 202-210.
  8. Jabez, J., and B. Muthukumar. "Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach." Procedia Computer Science 48 (2015): 338-346.
  9. Hosseini, BS Mojtaba, Behnam Amiri, Mahboubeh Mirzabagheri, and Yong Shi. "A New Intrusion Detection Approach using PSO based Multiple Criteria Linear Programming." Procedia Computer Science 55 (2015): 231-237.
  10. Che, Jianhua, Yamin Duan, Tao Zhang, and Jie Fan. "Study on the security models and strategies of cloud computing." Procedia Engineering 23 (2011): 586-593.
  11. Fatema, Kaniz, Vincent C. Emeakaroha, Philip D. Healy, John P. Morrison, and Theo Lynn. "A survey of Cloud monitoring tools: Taxonomy, capabilities and objectives." Journal of Parallel and Distributed Computing 74, no. 10 (2014): 2918-2933.
  12. Liao, Hung-Jen, Chun-Hung Richard Lin, Ying-Chih Lin, and Kuang-Yuan Tung. "Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications 36, no. 1 (2013): 16-24.
  13. Di Pietro, Roberto, and Luigi V. Mancini. Intrusion detection systems. Vol. 38. Springer Science & Business Media, 2008.
  14. Zissis, Dimitrios, and Dimitrios Lekkas. "Addressing cloud computing security issues." Future Generation computer systems 28, no. 3 (2012): 583-592.
  15. Narwane, S. V., and S. L. Vaikol. "Intrusion Detection System in Cloud Computing Environment." In InInternational Conference on Advances in Communication and Computing Technologies (ICACACT). 2012.
  16. Mohod, Akash G., and Satish J. Alaspurkar. "Analysis of IDS for Cloud Computing." International Journal of Application or Innovation in Engineering & Management (IJAIEM) Vol 2: 344-349.
  17. Subashini, Subashini, and V. Kavitha. "A survey on security issues in service delivery models of cloud computing." Journal of network and computer applications 34, no. 1 (2011): 1-11.
  18. Mazzariello, Claudio, Roberto Bifulco, and Roberto Canonico. "Integrating a network IDS into an open source cloud computing environment." In Information Assurance and Security (IAS), 2010 Sixth International Conference on, pp. 265-270. IEEE, 2010.
  19. Kene, Snehal G., and Deepti P. Theng. "A review on intrusion detection techniques for cloud computing and security challenges." In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on, pp. 227-232. IEEE, 2015.
  20. Girma, Anteneh, Moses Garuba, Jiang Li, and Chunmei Liu. "Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment." In Information Technology-New Generations (ITNG), 2015 12th International Conference on, pp. 212-217. IEEE, 2015.

Keywords

Cloud computing, sophisticated attacks, multithreaded, anomaly detection, firewall, DDOS, SaaS, PaaS, IaaS.