E-ISSN: 5733-6783
P-ISSN: 5532-7563
DOI: https://iigdpublishers.com/article/34
The elasticity and abundant availability of computational resources are attractive to intruders exploit cloud vulnerabilities and were able to launch attacks against legitimate users to gain access to private and privileged information. The Intrusion Detection Systems are presented as a possible solution for protection; however, to effectively protect the cloud users, IDS should have the ability to expand rapidly by increasing or decreasing the amount or sensors, the measure of cloud resources are available, and isolating the access to infrastructure and the system levels. Protection against internal threats should also be planned, as most protection systems do not identify them correctly. In order to solve these problems, we present the EICIDS - Elastic and Internal Cloud-based Intrusion Detection System, which monitors the internal cloud environment, entering data capture sensors on the local network of user´s VMs, and therefore, able to detect suspicious behavior of users. For this, the EICIDS uses the characteristics of virtual machines such as fast boot, fast recovery, stop or pause of VM, migrate between different hosts and execution across multiple platforms, to monitor and protect the cloud computing environment and keep up with the growth or reduction cloud, in order to save resources.
Josenilson Dias Araújo
B. Kodada, P. Gaurav, & R. Alwyn. Pais. (2012). "Protection against DDoS and Data Modification Attack in Computational Grid Cluster Environment." International Journal of Computer Network and Information Security (IJCNIS), Vol.4, No.7, pp. 12-18.
N. Jeyanthi, & N. Iyengar. (2012). "Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment." International Journal of Communication Networks and Information Security (IJCNIS), Vol 4, No 3, pp. 163-173.
N. Iyengar, B. Arindam, & G. Gopinath. (2014). "A Fuzzy Logic Based Defense Mechanism against Distributed Denial of Services Attack in Cloud Environment." International Journal of Communication Networks and Information Security (IJCNIS), vol.6, No.3, pp. 233-245.
Movaghar & F. Sabahi. (2008). “Intrusion detection: A survey,” In Systems and Networks Communications. ICSNC'08. 3rd International Conference on, pages 23-26. IEEE.
F. Sousa, L. Moreira, J. Machado, (2009). “Computação em nuvem: Conceitos, tecnologias, aplicações e desafios,” Escola Regional de Computação do Ceará, Maranhão e Puauí (ERCEMAPI): Edufpi,” pp. 150-175.