Title :
A collaborative intrusion detection and Prevention System in Cloud Computing
Author :
Mohamed, Hager ; Adil, Lebbat ; Saida, Takashi ; Hicham, Medromi
Author_Institution :
ENSEM, Syst. Archit. Team, Hassan II Univ., Casablanca, Morocco
Abstract :
Cloud Computing has emerged as a model to process large volumetric data. Though Cloud Computing is very popular, cloud security could delay its adoption. Security of the cloud must provide data confidentiality and protection of resources. The security of Cloud Computing extends the physical security which securing equipment constituting the Cloud architecture, data security must ensure that the service to the client, and network security which plays an important role in ensuring service and reliable protection against attacks and intrusions. At this level, security systems operating in traditional networks are also used in the new model to strengthen its network security. In this work, we propose a collaborative model consists of the Intrusion Detection and Prevention System functions based distributed IDS and IPS, with the use of a hybrid detection technique for addressing the problems of attacks encountered, specifically distributed attacks such as port scanning attacks and distributed internally established within a Cloud Computing environment by users entitled to access, including the integration of the Signature Apriori Algorithm for generating new attack signatures whose objective is to develop the functioning of our security system to be able to detect and block various types of attacks and intrusions.
Keywords :
cloud computing; security of data; IDS; IPS; attack signatures; cloud architecture; cloud computing; cloud security; collaborative intrusion detection system; collaborative intrusion prevention system; collaborative model; data confidentiality; data protection; hybrid detection technique; network security; port scanning attacks; signature apriori algorithm; volumetric data processing; Cloud computing; Collaboration; Computational modeling; Computer architecture; Intrusion detection; Ports (Computers); IDS; IPS; Intrusion; distributed attack; event correlation; signature apriori algorithm;
Conference_Titel :
AFRICON, 2013
Conference_Location :
Pointe-Aux-Piments
Print_ISBN :
978-1-4673-5940-5
DOI :
10.1109/AFRCON.2013.6757727