DocumentCode :
1950803
Title :
Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine
Author :
Bakshi, Aman ; Yogesh, B.
Author_Institution :
B.TECH-Comput. Sci., SRM Univ., Chennai, India
fYear :
2010
fDate :
26-28 Feb. 2010
Firstpage :
260
Lastpage :
264
Abstract :
Innovation is necessary to ride the inevitable tide of change. The buzzword of 2009 seems to be "cloud computing" which is a futuristic platform to provides dynamic resource pools, virtualization, and high availability and enables the sharing, selection and aggregation of geographically distributed heterogeneous resources for solving large-scale problems in science and engineering. But with this ever developing cloud concept, problems are arising from this ¿golden solution¿ in the enterprise arena. Preventing intruders from attacking the cloud infrastructure is the only realistic thing the staff, management and planners can foresee. Regardless of company size or volume and magnitude of the cloud, this paper explains how maneuver IT virtualization strategy could be used in responding to a denial of service attack. After picking up a grossly abnormal spike in inbound traffic, targeted applications could be immediately transferred to virtual machines hosted in another data center. We\´re not reinventing the wheel. We have lots of technology and standardized solutions we can already use to engineer into the stack. We are just introducing them in the way least expected.
Keywords :
Internet; security of data; virtual enterprises; virtual machines; DDOS attacks; IT virtualization strategy; cloud computing; cloud infrastructure; cloud security; denial of service attack; dynamic resource pools; enterprise arena; geographically distributed heterogeneous resources; intrusion detection system; virtual machine; Availability; Cloud computing; Computer crime; Intrusion detection; Large-scale systems; Platform virtualization; Resource virtualization; Technological innovation; Tides; Virtual machining; Intrusion detection; cloud computing; data storage; honeypot; recent trend in IT; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Software and Networks, 2010. ICCSN '10. Second International Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-5726-7
Electronic_ISBN :
978-1-4244-5727-4
Type :
conf
DOI :
10.1109/ICCSN.2010.56
Filename :
5437670
Link To Document :
بازگشت