Title :
Proxy Network Intrusion Detection System for cloud computing
Author :
Oktay, Ucman ; Sahingoz, Ozgur Koray
Author_Institution :
Comput. Eng. Dept., Turkish Air Force Acad. (TuAFA), Istanbul, Turkey
Abstract :
Cloud computing is the state of the art approach of information technologies. While migrating from conventional data centers to cloud computing paradigm, administrators have to consider costs. Security is one of the biggest problems for all information technologies and also in cloud computing. Some mechanisms are used such as antivirus software, firewall, guard systems or intrusion detection/prevention systems to increase the system security. The main handicap of these mechanisms is extensive usage of hardware, especially CPU and memory. In this paper, we examine the hardware usage of Network Intrusion Detection Systems (NIDSs) with different network architectures. Although the virtualization is preferred by the most of the providers, we chose a virtualized environment as our test bed because of its easier implementation structure from other cloud technologies such as grid and blade architectures. We focused on a proxy NIDS architecture, which is a gateway-based approach (intrusion detection assignment carried out by an outer entity, so why we called it proxy) and has less hardware requirements than other positioning options. It is aimed to show an effective location to IDSs in a virtualized environment. As a result, both providers and customers can easily decide where to locate their defense mechanism.
Keywords :
cloud computing; security of data; virtualisation; NIDS architecture; antivirus software; blade architecture; cloud computing paradigm; cloud technologies; conventional data centers; defense mechanism; firewall; gateway-based approach; grid architecture; guard systems; hardware usage; information technologies; intrusion detection system; intrusion prevention system; network architectures; proxy network intrusion detection system; system security; virtualization; virtualized environment; Databases; Hardware; Instruction sets; Linux; Logic gates; Virtual machine monitors; Virtualization; cloud computing; intrusion detection; proxy NIDS; security;
Conference_Titel :
Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on
Conference_Location :
Konya
Print_ISBN :
978-1-4673-5612-1
DOI :
10.1109/TAEECE.2013.6557203