Detailed Information

Cited 8 time in webofscience Cited 13 time in scopus
Metadata Downloads

HIDCC: A hybrid intrusion detection approach in cloud computing

Authors
Hatef, Mohammad AminShaker, VahidJabbarpour, Mohammad RezaJung, Jason J.Zarrabi, Houman
Issue Date
Feb-2018
Publisher
WILEY
Keywords
cloud computing; intrusion detection systems; signature-based detection; Snort; unusual behavior based detection; warning management
Citation
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, v.30, no.3
Journal Title
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
Volume
30
Number
3
URI
https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/1190
DOI
10.1002/cpe.4171
ISSN
1532-0626
1532-0634
Abstract
The rapid growth of distributed computing systems that heavily communicate and interact with each other has raised the importance of confrontation against cyber intruders, attackers, and subversives. With respect to the emergence of cloud computing and its deployment all over the world, and because of its distributed and decentralized nature, a special security requirement is needed to protect this paradigm. Intrusion detection systems could differentiate usual and unusual behaviors by means of supervising, verifying, and controlling the configurations, log files, network traffic, user activities, and even the actions of different processes by which they could add new security dimensions to the cloud computing systems. The position of the intrusion detection mechanisms in cloud computing systems as well as the applied algorithms in those mechanisms are the 2 main factors in which many researches have focused on. The goal of those researches is to uncover intrusions as much as possible and to increase the rate and accuracy of detections while reducing the false warnings. Those solutions, however, mainly have high computational loads, low accuracy, and high implementation costs. In this paper, we present a comprehensive and accurate solution to detect and prevent intrusions in cloud computing systems by using a hybrid method, called HIDCC. The implementation results of the proposed method show that the intrusion coverage, intrusion detection accuracy, reliability, and availability in cloud computing systems are considerably increased, and false warnings are significantly reduced.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Software > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jung, Jason J. photo

Jung, Jason J.
소프트웨어대학 (소프트웨어학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE