Intrusion Detection in Hybrid Cloud Networks

被引:0
|
作者
Suresh-Menon, Durga [1 ]
Leeser, Miriam [1 ]
Zink, Michael [2 ]
机构
[1] Northeastern Univ, Coll Engn, ECE, Boston, MA 02115 USA
[2] Univ Massachusetts Amherst, Coll Engn, ECE, Amherst, MA USA
关键词
Network Intrusion Detection; Cybersecurity; Cloud Computing; Security; ACL; Detection; Prevention; Mitigation;
D O I
10.1109/Cloud-Summit61220.2024.00037
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The proliferation of cloud computing has significantly transformed the digital landscape, offering scalable resources and services over the Internet. However, this shift has also exposed cloud networks to a myriad of sophisticated cyber threats, necessitating robust and adaptive security mechanisms. Network Intrusion Detection Systems (NIDS) are put in place to manage some of these threats like denial of service attacks (DOS), distributed denial of service attacks (DDOS), scanning, and probing to name a few. This paper presents a novel approach to Network Intrusion Detection Systems (NIDS) tailored for hybrid cloud networks. The goal of our approach is to efficiently detect and mitigate an intruder by using a simple algorithm based on the data available in transmitted packets in a hybrid cloud network. Specifically, we identify potential network intruders assuming the very high data rates of modern data networks. Once the intruder is identified, their access to the network is restricted using the access control list on the switch. This approach can be done with very low latency and at line rate. We remove the suspected malicious user from the Access Control List (ACL) on a switch connected to the network admin server. We also propose a mechanism to reinstate the user if they successfully explain that they are not a network intruder. To evaluate the effectiveness of our approach, we conducted experiments in a simulated hybrid cloud network environment using data captured from a live data stream.
引用
收藏
页码:188 / 193
页数:6
相关论文
共 50 条
  • [1] Distributed and cooperative intrusion detection in cloud networks
    Ghribi, Saadia
    2016 MIDDLEWARE DOCTORAL SYMPOSIUM, 2016,
  • [2] A Hybrid Intrusion Detection System for Cloud Computing Environments
    Jelidi, Mohamed
    Ghourabi, Abdallah
    Gasmi, Karim
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 390 - 395
  • [3] HIDCC: A hybrid intrusion detection approach in cloud computing
    Hatef, Mohammad Amin
    Shaker, Vahid
    Jabbarpour, Mohammad Reza
    Jung, Jason
    Zarrabi, Houman
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (03):
  • [4] A Cooperative Intrusion Detection Model for Cloud Computing Networks
    Teng, Shaohua
    Zheng, Chaoyu
    Zhu, Haibin
    Liu, Dongning
    Zhang, Wei
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 107 - 118
  • [5] Data Augmentation for Intrusion Detection and Classification in Cloud Networks
    Chkirbene, Zina
    Ben Abdallah, Habib
    Hassine, Kawther
    Hamila, Ridha
    Erbad, Aiman
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 831 - 836
  • [6] Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach
    Rajendran, Praveen Kumar
    Muthukumar, B.
    Nagarajan, G.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 325 - 329
  • [7] HIDM: A Hybrid Intrusion Detection Model for Cloud Based Systems
    Vashishtha, Lalit Kumar
    Singh, Akhil Pratap
    Chatterjee, Kakali
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (04) : 2637 - 2666
  • [8] HIDM: A Hybrid Intrusion Detection Model for Cloud Based Systems
    Lalit Kumar Vashishtha
    Akhil Pratap Singh
    Kakali Chatterjee
    Wireless Personal Communications, 2023, 128 : 2637 - 2666
  • [9] Intrusion Detection in the Cloud
    Roschke, Sebastian
    Cheng, Feng
    Meinel, Christoph
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 729 - 734
  • [10] Intrusion Detection based on "Hybrid" Propagation in Bayesian Networks
    Jemili, Farah
    Zaghdoud, Montaceur
    Ben Ahmed, Mohamed
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 137 - 142