Title :
Intrusion Detection in the Cloud
Author :
Roschke, Sebastian ; Cheng, Feng ; Meinel, Christoph
Author_Institution :
Hasso Plattner Inst. (HPI), Univ. of Potsdam, Potsdam, Germany
Abstract :
Intrusion detection systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. IDS management is an important capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located in the distributed environment. Facing new application scenarios in cloud computing, the IDS approaches yield several problems since the operator of the IDS should be the user, not the administrator of the cloud infrastructure. Extensibility, efficient management, and compatibility to virtualization-based context need to be introduced into many existing IDS implementations.Additionally, the cloud providers need to enable possibilities to deploy and configure IDS for the user. Within this paper, we summarize several requirements for deploying IDS in the cloud and propose an extensible IDS architecture for being easily used in a distributed cloud infrastructure.
Keywords :
Internet; security of data; IDS management; cloud computing; cloud providers; distributed IDS solutions; distributed cloud infrastructure; distributed environment; intrusion detection system; network communication; virtualization-based context compatibility; Application software; Cloud computing; Computer architecture; Computer networks; Intrusion detection; Monitoring; Network servers; Protection; Robustness; Virtual machining; Cloud Computing; IDS; IDS Management; Virtual Machine; Virtualization;
Conference_Titel :
Dependable, Autonomic and Secure Computing, 2009. DASC '09. Eighth IEEE International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-3929-4
Electronic_ISBN :
978-1-4244-5421-1
DOI :
10.1109/DASC.2009.94