A Review on Intrusion Detection System to Protect Cloud Data



Similar documents
An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

Intrusion Detection for Mobile Ad Hoc Networks

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Taxonomy of Intrusion Detection System

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Name. Description. Rationale

Overview - Snort Intrusion Detection System in Cloud Environment

IDS / IPS. James E. Thiel S.W.A.T.

IDS : Intrusion Detection System the Survey of Information Security

Intrusion Detection from Simple to Cloud

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

Performance Evaluation of Intrusion Detection Systems

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

CSCE 465 Computer & Network Security

Role of Anomaly IDS in Network

Securing Cloud using Third Party Threaded IDS

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

A Review on Network Intrusion Detection System Using Open Source Snort

Network Security Forensics

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

Intrusion Detection Systems

Comparative Study of Intrusion Detection Systems in Cloud Computing

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

INTRUSION DETECTION SYSTEMS and Network Security

Network- vs. Host-based Intrusion Detection

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila

Introduction of Intrusion Detection Systems

Intrusion Detection System (IDS)

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

PROFESSIONAL SECURITY SYSTEMS

Intrusion Detection/Prevention Systems in the Cloud. Joseph Johann ICTN6875. East Carolina University

IDSaaS: Intrusion Detection System as a Service in Public Clouds

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

CHAPTER 1 INTRODUCTION

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Firewalls and Intrusion Detection

Keyword: Cloud computing, service model, deployment model, network layer security.

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

City Research Online. Permanent City Research Online URL:

Network Security Demonstration - Snort based IDS Integration -

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Secure the Cloud Computing Environment from Attackers using Intrusion Detection System

Chapter 9 Firewalls and Intrusion Prevention Systems

California State University, Chico. Information Security Incident Management Plan

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

SURVEY OF INTRUSION DETECTION SYSTEM

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

Intrusion Detection and Prevention in Cloud Environment: A Systematic Review

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

FISMA / NIST REVISION 3 COMPLIANCE

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka.

Marlicia J. Pollard East Carolina University ICTN 4040 SECTION 602 Mrs. Boahn Dr. Lunsford

Network Based Intrusion Detection Using Honey pot Deception

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

IDPS: An Integrated Intrusion Handling Model for Cloud Computing Environment

NETWORK SECURITY (W/LAB) Course Syllabus

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

Complete Protection against Evolving DDoS Threats

Countermeasure for Detection of Honeypot Deployment

Network Traffic Monitoring With Attacks and Intrusion Detection System

Network-Based and Host- Based Intrusion Detection. Harley Kozushko. Graduate Seminar

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Survey on DDoS Attack Detection and Prevention in Cloud

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

PREVENT DDOS ATTACK USING INTRUSION DETECTON SYSTEM IN CLOUD

Guideline on Auditing and Log Management

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

Architecture Overview

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

Firewalls, Tunnels, and Network Intrusion Detection

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Segurança Redes e Dados

Database Security, Virtualization and Cloud Computing

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Transcription:

A Review on Intrusion Detection System to Protect Cloud Data Shivani Arora 1, Rajesh Kumar Bawa 2 M.Tech Student 1, Associate Professor 2 Department of Computer Science, Punjabi University Patiala 1, 2 Abstract: Cloud computing is a paradigm which allows the users to use the applications without installing them at their own end. With internet access, they can access their files at any computer. Different types of attacks such as Denial of service attack and Distributed denial of service attack makes the network to become unusable. With the use of IDS, these types of attacks can be resisted. An IDS identifies suspicious behavior by monitoring and analyzing the user traffic. It sends early alarms whenever there is risk of exposure caused by an attack. Thus it helps in preventing the serious damage to the system. In this paper, a review on IDS is done to protect cloud data and comparison is done on basis of different parameters. Keywords: Cloud data, IDS, denial of service, security, INTRODUCTION a. Cloud Computing Cloud Computing does not deliver the product, rather it provides the computing as a service where shared resources, software and information are provided to computers and other devices as a utility over a network. It provides storage services that do not need enduser knowledge of the physical location and configuration of the system that delivers the services. The main disadvantage of Cloud Computing is security. Various attacks such as IP spoofing, Address Resolution Protocol spoofing, Routing information Protocol attack, DNS poisoning, Flooding, Denial of Service 30 Shivani Arora 1, Rajesh Kumar Bawa 2 (DoS), Distributed Denial of Service cause the targeted system or network unusable. Intrusion detection system (IDS) is a solution to resist these kinds of attacks [1]. b. Types of attacks First kind of attack is known as internal attack in which authorized cloud users may try to gain unauthorized privileges. After signing in, frauds can be committed and information can be disclosed to others. For example, an internal DoS attack demonstrated against the Amazon Elastic Compute Cloud (EC2). In External Attacks, outsiders disturb nodes from providing services. Internal intrusion is more dangerous than external. c. Intrusion Detection System Intrusion detection system (IDS) is one of the most efficient attack prevention mechanisms. The traffic that violates pre-defined rules will be alerted or blocked, but not for that inside the perimeter. In the environment of cloud, many audit logs are recorded and many alert logs are also reported by IDS. Some attack attempts recorded in a log might not be successful as the target machine does not possess the vulnerability exploited by the attack. Therefore, alert or warning from a log might not be able to plot the whole picture. However, multiple logs could indicate if a previous attack is successful as a compromised target may leave some attack trace in different logs. [9]. With the help of IDS, the logs, user and network traffic are monitored and analyzed in

a view to identify any suspicious activity. An IDS sends early alarm upon risks of exposure caused by any attack so that the system administrators get alert and execute respective response measurements to prevent any damage to the system. An IDS consists of several components- a sensor which generates security events, a console to monitor events, alerts and control the sensor, and a central engine that s records event logged by the sensor in a database and generates alert from security event received [8]. d. Types of IDS IDSs can be classified into host based IDSs, network-based IDSs and distributed IDSs. 1. Host-Based Intrusion Detection System Host-based IDSs operate on information collected from within an individual computer system. It monitors the packets from the computer system only and would alert the user or administrator if suspicious activity is detected. Host-based IDSs use the computing resources of the hosts they are monitoring, therefore inflicting a performance cost on the monitored systems. 2. Network-Based Intrusion Detection System Network-based Intrusion Detection Systems stress on the network rather than a specific host. Network-based IDS detects attacks by capturing and analyzing network packets. By listening on a network segment, a networkbased IDS can monitor the network traffic that affects many hosts which are connected to the network segment, hence protecting those hosts. 3. Distributed Intrusion Detection System (DIDS) A Distributed IDS (DIDS) consists of multiple IDS (E.g. HIDS, NIDS etc.) over a large network, all of which communicate with each other, or with a central server that enables 31 Shivani Arora 1, Rajesh Kumar Bawa 2 network monitoring. The intrusion detection components collect the system information, convert it into a standardized form and pass it to central analyzer. Central analyzer aggregates information from multiple IDS and analyzes the same [1]. e. Intrusion Detection Techniques The intrusion detection techniques are discussed as follows: Anomaly Detection Approach This approach is used to identify abnormal unusual behavior on a host or network. They assume that attacks are different from legitimate activity and can therefore be detected by systems that identify these differences. Misuse Detection Approach This approach analyzes system activity, looks for events or sets of events that match a predefined pattern of events that describe a known attack. As the patterns corresponding to known attacks are called signatures, misuse detection is sometimes called signature-based detection. LITERATURE SURVEY C. Modi et al. [1] studied that cloud computing provides scalable, virtualized ondemand services to the end users with greater flexibility and lesser infrastructural investment. The bugs and vulnerabilities which exist in underlying technologies and legacy protocols open doors for intrusion. It discusses various techniques and types of IDS and how they can be incorporated in cloud. Intrusions like integrity, confidentiality and availability of Cloud services in the future are studied.. This paper stresses on the use of other alternative options to incorporate IDS/IPS in cloud and explores the locations

where IDS/IPS can be positioned so that attacks on data can be easily detected and prevented. Recent research findings which incorporate IDS/IPS in Cloud have been discussed and their advantages and disadvantages have been highlighted. The paper has identified several security challenges which can be resolved. C. M. Chen et al. [9] proposed a detection system which analyzes the logs in the cloud to determine the intensions behind the attacks. Sometimes the administrator neglects some stealthy reconnaissance actions for the insignificant number of violations. Hidden Markov model is adopted to model the sequence of attack performed by hacker and such stealthy events in a long time frame will become significant in the state-aware model. The preliminary results show that the proposed system can identify such attack plans in the real network. The primary concern is whether user data is secure and the allocated resources are not bleached in such sharedsource and distributed computing environment. Traditional intrusion detection mechanism might not be able to address such issue as some traffic might not be monitored. Multiple logs in cloud should be inspected and correlated to identify attack plans adopted by hackers in cloud. This study examines the stages of an attack plan and analyzes logs to identify attack sequences. Hidden Markov model, suitable for recognizing time sequence events, is proposed to detect such attacks. The preliminary results show that the proposed detection model is efficient to identify attack sequences. P.K. Shelke et al. (2012) [2] suggested that providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. Distributed model of cloud makes it vulnerable and prone to sophisticated 32 Shivani Arora 1, Rajesh Kumar Bawa 2 distributed intrusion attacks like Distributed Denial of Service (DDOS) and Cross Site Scripting (XSS). To handle large scale network access traffic and administrative control of data and application in cloud, a new multi-threaded distributed cloud IDS model has been proposed. The proposed cloud IDS handles large flow of data packets, analyze them and generate reports efficiently by integrating knowledge and behavior analysis to detect intrusions. R.Vanathi et al. (2012) [6] studied that computer networks face a constant struggle against intruders and attackers. Attacks on distributed systems grow stronger and more prevalent each and every day. Intrusion detection methods are a key to control and potentially eradicate attacks on a system. An Intrusion detection system pertains to the methods used to identify an attack on a computer or computer network. In cloud computing environment the applications are user-centric and the customers should be confident about their applications stored in the cloud server. Network Intrusion Detection System (NIDS) plays an important role in providing the network security. They provide a defense layer which monitors the network traffic for pre-defined suspicious activity or pattern. Snort, Tcpdump and Network Flight Recorder are the most famous NIDS. C.L. Tsai et al. (2011) [3] proposed a dynamic intrusion detection system for strengthening the security application of cloud computing. In the proposed mechanism, numbers of intrusion detectors are dispatched on the whole topology of the networking system through multi-layers and multi stages deployment. Those information security issues related with the application and service of cloud computing are experimented and discussed. The experiments include the equipment security of the client side termination, the threats of web site and webpage, the detection and diagnosis and surveillance of intrusion, the access and

security of database in the cloud side, the detection of system leakage and the monitor of real-time repairing process, the management of server system, the management of mobile e- commerce processing, and the integrated analysis of associated security information and issues. The goal of the proposed mechanism is not only focused on finding out some solutions, but also focused on developing some feasible information security techniques or products for the application and service of cloud computing. Experimental results demonstrate that the proposed mechanism does provide good performance for intrusion detection. S. Roschke et al. (2009) [4] pointed out that Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. IDS management is an important capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located in the distributed environment. Facing new application scenarios in Cloud Computing, the IDS approaches yield several problems since the operator of the IDS should be the user, not the administrator of the Cloud infrastructure. Extensibility, efficient management, and compatibility to virtualization-based context need to be introduced into many existing IDS implementations. Additionally, the Cloud providers need to enable possibilities to deploy and configure IDS for the user. They summarized several requirements for deploying IDS in the Cloud and propose an extensible IDS architecture for being easily used in a distributed cloud infrastructure. C.C. Lo et al. (2010) [5] developed a framework of cooperative intrusion detection system (IDS). The proposed system could reduce the impact of denial of-service (DoS) attack or distributed denial-of-service (DDoS) attacks. To provide such ability, IDSs in the cloud computing regions exchange their alerts with each other. In the system, each of IDSs has a cooperative agent used to compute and determine whether to accept the alerts sent from other IDSs or not. By this way, IDSs could avoid the same type of attack happening. The implementation results indicate that the proposed system could resist DoS attack. Moreover, by comparison, the proposed cooperative IDS system only increases little computation effort compared with pure Snort based IDS but prevents the system from single point of failure attack. CONCLUSION In this paper, we have discussed the paradigm of cloud computing, various types of attacks that hamper the security of the cloud, intrusion detection system to monitor and analyze the attacks, types and techniques of IDS. Research findings of different authors have been discussed and the future research scope is discussed. REFERENCES [1] C. Modi, D. Patel, H. Patel, B. Borisaniya, A. Patel, M. Rajarajan, A survey of intrusion detection techniques in Cloud, Journal of Network and Computer Applications, 36(1), pp. 42-57, 2013. [2] Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande, Intrusion Detection System for Cloud Computing, International Journal of Scientific & Technology Research Volume 1, Issue 4, May 2012. [3] C-L.Tsai, U-C. Lin, A.Y.Chang, C-J.Chen, Information Security Issue of Enterprises Adopting the Application of Cloud Computing, Department of Computer Science, Chinese Culture University, 2011. 33 Shivani Arora 1, Rajesh Kumar Bawa 2

[4] S. Roschke, F.Cheng, C.Meinel, Intrusion Detection in the Cloud, Hasso Plattner Institute (HPI), University of Potsdam, Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009. [5] C-C. Lo, C-C.Huang, J.Ku, A Cooperative Intrusion Detection System Framework for Cloud Computing Networks, Institute of Information Management, National Chiao Tung University, 39th International Conference on Parallel Processing Workshops, 2010. [6] R.Vanathi & S.Gunasekaran, Comparison of Network Intrusion Detection Systems in Cloud Computing Environment, Department of Computer Science Coimbatore Institute of Engineering and Technology, International Conference on Computer Communication and Informatics (ICCCI -2012), Jan. 10 12, 2012, Coimbatore, INDIA, 2012. [7] H.A.Kholidy, F.Baiardi, CIDD: A Cloud Intrusion Detection Dataset For Cloud Computing and Masquerade Attacks, Ninth International Conference on Information Technology- New Generations, 2012. [8] W. Yassin, N.I. Udzir, Z. Muda, A. Abdullah and M.T. Abdullah, A Cloud- Based Intrusion Detection Service Framework, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, 2012. [9] C-M Chen, D. J. Guan, Y-Z Huang, and Y- H Ou, Attack Sequence Detection in Cloud Using Hidden Markov Model, Department of Computer Science and Engineering, Seventh Asia Joint Conference on Information Security, 2012. [10] R.S. Khune and J. Thangakumar, A Cloud-Based Intrusion Detection System for Android Smartphones, 2012 International Conference on Radar, Communication and Computing (ICRCC), SKP Engineering College, Tiruvannamalai, TN., India. 21-22 December, 2012. pp.180-184. 34 Shivani Arora 1, Rajesh Kumar Bawa 2