Thursday 25 July 2013

A Study on Intrusion Detection System Techniques in CLOUD

Vol. 7 No. 3

Year: 2013
 
Issue:
Jan-Mar

Title : A Study on Intrusion Detection System Techniques in CLOUD
   
Author Name : Aramudhan M, N. Thirmoorthi , V. Suresh Kumar , S.S. Mourougan , S. JayaPrakash

Synopsis :  

Cloud environment requires better security due to the exponential growth of information, policies, services, resources, application and users. Flooding attacks such as SYN flood, UDP flood, HTTP flood, and FIN-WAIT have been posing a dangerous threat to Web servers, DNS servers, Mail servers, VoIP servers, etc. These flooding attacks reduce the limited capacity of the server resources and legal users could not able to access the resources of the server. Existing detection techniques used in Firewalls, IPS, IDS, etc., fail to identify the illegitimate traffic due to its self-similarity nature of legitimate traffic, suffer from low detection accuracy and high false alarms. Hence, automatic self intelligent mechanism is needed to identify these attacks that reduce the performance of the server. Intrusion Detection System (IDS) is an updatable, extensible and flexible security component that essential needs for protecting resources from illegitimate traffic and users in cloud environment. This paper deals with the existing computational techniques available with respect to IDS in cloud, their merits and demerits. The contents of this study should provide useful insights into the current IDS literature and be a good source for anyone who is interested in the application of IDSs.
 

No comments:

Post a Comment