DocumentCode
1950803
Title
Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine
Author
Bakshi, Aman ; Yogesh, B.
Author_Institution
B.TECH-Comput. Sci., SRM Univ., Chennai, India
fYear
2010
fDate
26-28 Feb. 2010
Firstpage
260
Lastpage
264
Abstract
Innovation is necessary to ride the inevitable tide of change. The buzzword of 2009 seems to be "cloud computing" which is a futuristic platform to provides dynamic resource pools, virtualization, and high availability and enables the sharing, selection and aggregation of geographically distributed heterogeneous resources for solving large-scale problems in science and engineering. But with this ever developing cloud concept, problems are arising from this ¿golden solution¿ in the enterprise arena. Preventing intruders from attacking the cloud infrastructure is the only realistic thing the staff, management and planners can foresee. Regardless of company size or volume and magnitude of the cloud, this paper explains how maneuver IT virtualization strategy could be used in responding to a denial of service attack. After picking up a grossly abnormal spike in inbound traffic, targeted applications could be immediately transferred to virtual machines hosted in another data center. We\´re not reinventing the wheel. We have lots of technology and standardized solutions we can already use to engineer into the stack. We are just introducing them in the way least expected.
Keywords
Internet; security of data; virtual enterprises; virtual machines; DDOS attacks; IT virtualization strategy; cloud computing; cloud infrastructure; cloud security; denial of service attack; dynamic resource pools; enterprise arena; geographically distributed heterogeneous resources; intrusion detection system; virtual machine; Availability; Cloud computing; Computer crime; Intrusion detection; Large-scale systems; Platform virtualization; Resource virtualization; Technological innovation; Tides; Virtual machining; Intrusion detection; cloud computing; data storage; honeypot; recent trend in IT; security;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication Software and Networks, 2010. ICCSN '10. Second International Conference on
Conference_Location
Singapore
Print_ISBN
978-1-4244-5726-7
Electronic_ISBN
978-1-4244-5727-4
Type
conf
DOI
10.1109/ICCSN.2010.56
Filename
5437670
Link To Document