Vol. 7 No. 3
Year: 2013
Issue: Jan-Mar
Title : A
Study on Intrusion Detection System Techniques in CLOUD
Author
Name : Aramudhan M, N.
Thirmoorthi , V. Suresh Kumar , S.S. Mourougan , S. JayaPrakash
Synopsis :
Cloud environment
requires better security due to the exponential growth of information,
policies, services, resources, application and users. Flooding attacks such as
SYN flood, UDP flood, HTTP flood, and FIN-WAIT have been posing a dangerous
threat to Web servers, DNS servers, Mail servers, VoIP servers, etc. These
flooding attacks reduce the limited capacity of the server resources and legal
users could not able to access the resources of the server. Existing detection
techniques used in Firewalls, IPS, IDS, etc., fail to identify the illegitimate
traffic due to its self-similarity nature of legitimate traffic, suffer from
low detection accuracy and high false alarms. Hence, automatic self intelligent
mechanism is needed to identify these attacks that reduce the performance of
the server. Intrusion Detection System (IDS) is an updatable, extensible and
flexible security component that essential needs for protecting resources from
illegitimate traffic and users in cloud environment. This paper deals with the
existing computational techniques available with respect to IDS in cloud, their
merits and demerits. The contents of this study should provide useful insights
into the current IDS literature and be a good source for anyone who is
interested in the application of IDSs.
No comments:
Post a Comment