Fundamentals of intrusion detection and prevention system in cloud environments
Keywords:
Networks, IDPS Snort, Virtualization, Cloud ComputingAbstract
NIST (National Institute of Parameters and Technology – USA) defines Cloud Computing as on-demand network access to a shared set of configurable computing resources that can be quickly provisioned and released with minimal management effort or management through cloud provider interaction. In this context, issues related to security become one of the biggest challenges in all interconnected networks. Security Methodologies may vary depending on the technology used. Within a Cloud environment we can find several options to activate different security mechanisms, which are capable of controlling, monitoring and restricting access to the network. In this article I analyze the fundamental notions of the Intrusion Detection and Prevention System (IDPS) in Cloud Environments. We will add a survey to our methodology for configuring a Snort Software IDPS system.
Downloads
References
Almorsy, L., M.; Grundy, J.; Muller, I. (2010). An Analysis of The Cloud Computing Security Problem Computer Science & Software Engineering. In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov 2010. Faculty of Information & Communication Technologies Swinburne University of Technology, Hawthorn, Victoria, Australia.
Carvalho, C.; Andrade, R.; Coutinho, E. ; Castro, M.; Agoulmine, N. (2017). State of the art and challenges of security SLA for cloud computing. Computers and Electrical Engineering 1–12. http://dx.doi.org/10.1016/j.compeleceng.2016.12.03.
Cloud Security Alliance (CSA). (2017). Top Threats to Cloud Computing. Cloud Security Alliance - http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf. Iqbal, S.; Kiah M., Dhaghighi D.; Hussain, M.; Khan, S: Kurram Khan; CHOO, R. (2018). On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service. Journal of Network and Computer Applications, http://dx.doi.org/10.1016/j.jnca.2016.08.016.
Kuldeep, T.; Tyagi S.; Agrawal, R. (2017). Overview - Snort Intrusion Detection System in Cloud Environment. International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 3 pp. 329-334 International Research Publications House http://www. irphouse.com /ijict.htm.
Lawal, B.O.; Ibitola, A.; Longe, O. (2019). Strategic Sensor Placement for Intrusion Detection in Network-Base IDS. Olabisi Onabanjo University Consult Ibadan Centre, Ibadan, Nigeria.
NIST. (2020). Definition of Cloud Computing http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
OPENSTACK. (2020). Install Guide. OpenStack contributors. Available at: https://docs.openstack.org//install-guide/InstallGuide.pdf Oct 13.
Silkari, S. (2020). A Survey Over the Various Malware Detection Techniques used in Cloud Computing. Department of CSE (UIT) RGPV Bhopal, India.
SNORT. (2022). User’s Manual. The Snort Project. version 2.9.16. Available at https://snort-org site.s3.amazonaws.com/production/document_files/files/000/000/249/original/s ort_manual.pdf.
Veeramachaneni, V.K. (2015). Security Issues and Countermeasures in Cloud Computing Environment. International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 4, Issue 5.
Wang, H. (2018). Survey on Performance Analysis of Virtualized Systems. George Mason University, 2018.
Winkler, V. (2017). Securing the Cloud: Cloud Computer Security Techniques and Tactics by Graham Speake, Vic (J.R.) Winkler. Syngress publications..
Published
How to Cite
Issue
Section
Copyright (c) 2024 Revista Processando o Saber
![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Os direitos autorais dos artigos publicados pertencem à Revista Processando o Saber e seguem o padrão Creative Commons (CC BY), que permite o remixe, adaptação e criação de obras derivadas do original, mesmo para fins comerciais. As novas obras devem conter menção ao(s) autor(es) nos créditos.