Title :
Scalable intrusion detection systems log analysis using cloud computing infrastructure
Author :
Kumar, Manoj ; Hanumanthappa, M.
Author_Institution :
Dept. of Master of Comput. Applic., M.S. Ramaiah Inst. of Technol., Bangalore, India
Abstract :
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. It identifies unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators. Intrusion detection systems (IDS) are essential components in a secure network environment, allowing for early detection of malicious activities and attacks. By employing information provided by IDS, it is possible to apply appropriate countermeasures and mitigate attacks that would otherwise seriously undermine network security. However, current high volumes of network traffic overwhelm most IDS techniques requiring new approaches that are able to handle huge volume of log and packet analysis while still maintaining high throughput. Hadoop, an open-source computing platform of MapReduce and a distributed file system, has become a popular infrastructure for massive data analytics because it facilitates scalable data processing and storage services on a distributed computing system consisting of commodity hardware. The proposed architecture is able to efficiently handle large volumes of collected data and consequent high processing loads using Hadoop, MapReduce and cloud computing infrastructure. The main focus of the paper is to enhance the throughput and scalability of the IDS Log analysis. Once enough data is gathered, it is necessary to rapidly analyze it and determine whether any attacks or malicious activities are present, which is the main issue that impacts IDS performance.
Keywords :
cloud computing; security of data; Hadoop; IDS; IDS monitors network traffic; cloud computing infrastructure; computer systems; data analytics; data processing; distributed computing system; distributed file system; malicious activities; malicious attacks; network administrator; network environment security; network security; open-source computing platform; scalable intrusion detection systems log analysis; storage services; suspicious activity; Cloud computing; Computer architecture; Computers; File systems; IP networks; Intrusion detection; Telecommunication traffic; Cloud Computing; Hadoop File System; Intrusion Detection System; MapReduce;
Conference_Titel :
Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on
Conference_Location :
Enathi
Print_ISBN :
978-1-4799-1594-1
DOI :
10.1109/ICCIC.2013.6724158