Fundamentals of intrusion detection and prevention system in cloud environments

Authors

Keywords:

Networks, IDPS Snort, Virtualization, Cloud Computing

Abstract

NIST (National Institute of Parameters and Technology – USA) defines Cloud Computing as on-demand network access to a shared set of configurable computing resources that can be quickly provisioned and released with minimal management effort or management through cloud provider interaction. In this context, issues related to security become one of the biggest challenges in all interconnected networks. Security Methodologies may vary depending on the technology used. Within a Cloud environment we can find several options to activate different security mechanisms, which are capable of controlling, monitoring and restricting access to the network. In this article I analyze the fundamental notions of the Intrusion Detection and Prevention System (IDPS) in Cloud Environments. We will add a survey to our methodology for configuring a Snort Software IDPS system.

 

Downloads

Download data is not yet available.

References

Almorsy, L., M.; Grundy, J.; Muller, I. (2010). An Analysis of The Cloud Computing Security Problem Computer Science & Software Engineering. In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov 2010. Faculty of Information & Communication Technologies Swinburne University of Technology, Hawthorn, Victoria, Australia.

Carvalho, C.; Andrade, R.; Coutinho, E. ; Castro, M.; Agoulmine, N. (2017). State of the art and challenges of security SLA for cloud computing. Computers and Electrical Engineering 1–12. http://dx.doi.org/10.1016/j.compeleceng.2016.12.03.

Cloud Security Alliance (CSA). (2017). Top Threats to Cloud Computing. Cloud Security Alliance - http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf. Iqbal, S.; Kiah M., Dhaghighi D.; Hussain, M.; Khan, S: Kurram Khan; CHOO, R. (2018). On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service. Journal of Network and Computer Applications, http://dx.doi.org/10.1016/j.jnca.2016.08.016.

Kuldeep, T.; Tyagi S.; Agrawal, R. (2017). Overview - Snort Intrusion Detection System in Cloud Environment. International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 3 pp. 329-334 International Research Publications House http://www. irphouse.com /ijict.htm.

Lawal, B.O.; Ibitola, A.; Longe, O. (2019). Strategic Sensor Placement for Intrusion Detection in Network-Base IDS. Olabisi Onabanjo University Consult Ibadan Centre, Ibadan, Nigeria.

NIST. (2020). Definition of Cloud Computing http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.

OPENSTACK. (2020). Install Guide. OpenStack contributors. Available at: https://docs.openstack.org//install-guide/InstallGuide.pdf Oct 13.

Silkari, S. (2020). A Survey Over the Various Malware Detection Techniques used in Cloud Computing. Department of CSE (UIT) RGPV Bhopal, India.

SNORT. (2022). User’s Manual. The Snort Project. version 2.9.16. Available at https://snort-org site.s3.amazonaws.com/production/document_files/files/000/000/249/original/s ort_manual.pdf.

Veeramachaneni, V.K. (2015). Security Issues and Countermeasures in Cloud Computing Environment. International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 4, Issue 5.

Wang, H. (2018). Survey on Performance Analysis of Virtualized Systems. George Mason University, 2018.

Winkler, V. (2017). Securing the Cloud: Cloud Computer Security Techniques and Tactics by Graham Speake, Vic (J.R.) Winkler. Syngress publications..

Published

2024-06-04

How to Cite

BORA, S. S. M. Fundamentals of intrusion detection and prevention system in cloud environments. Revista Processando o Saber, v. 16, n. 01, p. 01-12, 4 Jun. 2024.

Issue

Section

Tecnologia em Análise e Desenvolvimento de Sistemas