Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditi...

Full description

Bibliographic Details
Main Author: M. Rezvani
Format: Article
Language:English
Published: Shahrood University of Technology 2018-07-01
Series:Journal of Artificial Intelligence and Data Mining
Subjects:
Online Access:http://jad.shahroodut.ac.ir/article_1087_fe882655bef00e1f3d718332e1ca46ef.pdf
id doaj-970f26d03e3a48839ca0a716cdd10285
record_format Article
spelling doaj-970f26d03e3a48839ca0a716cdd102852020-11-24T21:10:48ZengShahrood University of TechnologyJournal of Artificial Intelligence and Data Mining2322-52112322-44442018-07-016238739710.22044/jadm.2017.5581.16681087Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud ComputingM. Rezvani0Faculty of Computer Engineering, Shahrood University of Technology, Shahrood, IranCloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud environments. This is because that such IDSs employ only the network information in their detection engine and this, therefore, makes them ineffective for the cloud-specific vulnerabilities. In this paper, we propose a novel assessment methodology for anomaly-based IDSs for cloud computing which takes into account both network and system-level information for generating the evaluation dataset. In addition, our approach deploys the IDS sensors in each virtual machine in order to develop a cooperative anomaly detection engine. The proposed assessment methodology is then deployed in a testbed cloud environment to generate an IDS dataset which includes both network and system-level features. Finally, we evaluate the performance of several machine learning algorithms over the generated dataset. Our experimental results demonstrate that the proposed IDS assessment approach is effective for attack detection in the cloud as most of the algorithms are able to identify the attacks with a high level of accuracy.http://jad.shahroodut.ac.ir/article_1087_fe882655bef00e1f3d718332e1ca46ef.pdfintrusion detection systemCloud ComputingClassificationdataset generationIDS assessment
collection DOAJ
language English
format Article
sources DOAJ
author M. Rezvani
spellingShingle M. Rezvani
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Journal of Artificial Intelligence and Data Mining
intrusion detection system
Cloud Computing
Classification
dataset generation
IDS assessment
author_facet M. Rezvani
author_sort M. Rezvani
title Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
title_short Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
title_full Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
title_fullStr Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
title_full_unstemmed Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
title_sort assessment methodology for anomaly-based intrusion detection in cloud computing
publisher Shahrood University of Technology
series Journal of Artificial Intelligence and Data Mining
issn 2322-5211
2322-4444
publishDate 2018-07-01
description Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud environments. This is because that such IDSs employ only the network information in their detection engine and this, therefore, makes them ineffective for the cloud-specific vulnerabilities. In this paper, we propose a novel assessment methodology for anomaly-based IDSs for cloud computing which takes into account both network and system-level information for generating the evaluation dataset. In addition, our approach deploys the IDS sensors in each virtual machine in order to develop a cooperative anomaly detection engine. The proposed assessment methodology is then deployed in a testbed cloud environment to generate an IDS dataset which includes both network and system-level features. Finally, we evaluate the performance of several machine learning algorithms over the generated dataset. Our experimental results demonstrate that the proposed IDS assessment approach is effective for attack detection in the cloud as most of the algorithms are able to identify the attacks with a high level of accuracy.
topic intrusion detection system
Cloud Computing
Classification
dataset generation
IDS assessment
url http://jad.shahroodut.ac.ir/article_1087_fe882655bef00e1f3d718332e1ca46ef.pdf
work_keys_str_mv AT mrezvani assessmentmethodologyforanomalybasedintrusiondetectionincloudcomputing
_version_ 1716755115689377792