A DISTRIBUTED INTRUSION DETECTION MODEL BASED ON CLOUD THEORY

被引:0
|
作者
Li, Han [1 ]
Wu, Qiuxin [1 ]
机构
[1] Beijing Informat Sci & Technol Univ, Sch Appl Sci, Beijing, Peoples R China
关键词
Cloud model; Intrusion detection; Distributed; DDoS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is defined as the storage, management, processing, and accessing information and other data stored in a specific server. With the advent of internet, intrusion attacks have gained sophistication over the time. Distributed attacks could not be detected by the present available intrusion detection system. In this case, we propose a distributed intrusion detection model based on Cloud theory. Our model is composed by Intrusion Detection Agent subsystem and Data Aggregation subsystem. Intrusion Detection Agent subsystem has three parts: data collection module, Cloud decision-making module and communication module. An intrusion detection algorithm based on Cloud theory was proposed to detect intrusion behavior and improve the detection ability to complicated intrusion. Followed by our model, we introduced a strategy to defend DDoS attack using the elastic properties of cloud platform.
引用
收藏
页码:435 / 439
页数:5
相关论文
共 50 条
  • [31] A Novel Distributed Intrusion Detection Model Based on Immune Mobile Agent
    Li, Yongzhong
    Wang, Rushan
    Xu, Jing
    2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 72 - 75
  • [32] A New Distributed Intrusion Detection Model Based on Immune Mobile Agent
    Xu, Jing
    Li, Yongzhong
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 461 - +
  • [33] A Distributed Intrusion Detection System For Cognitive Radio Networks Based On Evidence Theory
    Wang, Meiyu
    Li, Zhigang
    Lin, Yun
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 226 - 232
  • [34] Design of an event analysis of distributed intrusion detection system based on fuzzy theory
    Wu, Shaofei
    He, Shenghui
    Yang, Ming
    Journal of Computational Information Systems, 2009, 5 (01): : 417 - 420
  • [35] Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection
    Totel, Eric
    Hkimi, Mouna
    Hurfin, Michel
    Leslous, Mourad
    Labiche, Yvan
    2016 12TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2016), 2016, : 53 - 64
  • [36] An Intrusion Detection Model Based On Danger Theory and Mathematical Statistics
    Wang Chunzhi
    Ping Qi
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 715 - 719
  • [37] An adaptive model of a distributed intrusion detection system
    Platonov V.V.
    Semenov P.O.
    Automatic Control and Computer Sciences, 2017, 51 (8) : 894 - 898
  • [38] An Anomaly Detection Model Based on Cloud Model and Danger Theory
    Wang, Wenhao
    Zhang, Chen
    Zhang, Quan
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 115 - 122
  • [39] Cloud Intrusion Detection System Based on SVM
    Alheeti K.M.A.
    Lateef A.A.A.
    Alzahrani A.
    Imran A.
    Al Dosary D.
    International Journal of Interactive Mobile Technologies, 2023, 17 (11) : 101 - 114
  • [40] A Cloud Based Network Intrusion Detection System
    You, Li
    Wang, Zhanyong
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2022, 29 (03): : 987 - 992