Loading…

Distributed Intrusion Detection in Clouds Using Mobile Agents

Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private...

Full description

Saved in:
Bibliographic Details
Main Authors: Dastjerdi, A.V., Bakar, K.A., Tabatabaei, S.G.H.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 180
container_issue
container_start_page 175
container_title
container_volume
creator Dastjerdi, A.V.
Bakar, K.A.
Tabatabaei, S.G.H.
description Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private cloud into public cloud is security. This work tries to offer a line of defense by applying mobile agents technology to provide intrusion detection for cloud applications regardless of their locations. Therefore, CIOs feel safer to use cloud to extend their on-premise infrastructure by adding capacity on demand.
doi_str_mv 10.1109/ADVCOMP.2009.34
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5359505</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5359505</ieee_id><sourcerecordid>5359505</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-9bc0c1b5503a9cc03d5021c96802ca7b6a3a1d69f4f1f409d404d36266233743</originalsourceid><addsrcrecordid>eNotjL1OwzAURo1QJejPzMDiF0i49rWdemCIEgqVWpWhsFaO7VRGIUGxM_D2FMG3nHOWj5A7BjljoB_K-r067F9zDqBzFFdkDoXSEtdcwzWZM8GFkHCpG7KK8QMuE5Ijx1vyWIeYxtBMyTu67dM4xTD0tPbJ2_RroadVN0wu0rcY-jPdD03oPC3Pvk9xSWat6aJf_XNBjpunY_WS7Q7P26rcZYEVMmW6sWBZIyWg0dYCOgmcWa3WwK0pGmXQMKd0K1rWCtBOgHCouFIcsRC4IPd_t8F7f_oaw6cZv08SpZYg8QdwCUc2</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Distributed Intrusion Detection in Clouds Using Mobile Agents</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Dastjerdi, A.V. ; Bakar, K.A. ; Tabatabaei, S.G.H.</creator><creatorcontrib>Dastjerdi, A.V. ; Bakar, K.A. ; Tabatabaei, S.G.H.</creatorcontrib><description>Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private cloud into public cloud is security. This work tries to offer a line of defense by applying mobile agents technology to provide intrusion detection for cloud applications regardless of their locations. Therefore, CIOs feel safer to use cloud to extend their on-premise infrastructure by adding capacity on demand.</description><identifier>ISBN: 1424450829</identifier><identifier>ISBN: 9781424450824</identifier><identifier>EISBN: 0769538290</identifier><identifier>EISBN: 9780769538297</identifier><identifier>DOI: 10.1109/ADVCOMP.2009.34</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cloud computing ; Costs ; Distributed computing ; Economies of scale ; Grid computing ; Hardware ; Intrusion detection ; Intrusion Detection System ; Mobile Agent ; Mobile agents ; Scalability ; Turing machines</subject><ispartof>2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences, 2009, p.175-180</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5359505$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5359505$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Dastjerdi, A.V.</creatorcontrib><creatorcontrib>Bakar, K.A.</creatorcontrib><creatorcontrib>Tabatabaei, S.G.H.</creatorcontrib><title>Distributed Intrusion Detection in Clouds Using Mobile Agents</title><title>2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences</title><addtitle>ADVCOMP</addtitle><description>Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private cloud into public cloud is security. This work tries to offer a line of defense by applying mobile agents technology to provide intrusion detection for cloud applications regardless of their locations. Therefore, CIOs feel safer to use cloud to extend their on-premise infrastructure by adding capacity on demand.</description><subject>Cloud computing</subject><subject>Costs</subject><subject>Distributed computing</subject><subject>Economies of scale</subject><subject>Grid computing</subject><subject>Hardware</subject><subject>Intrusion detection</subject><subject>Intrusion Detection System</subject><subject>Mobile Agent</subject><subject>Mobile agents</subject><subject>Scalability</subject><subject>Turing machines</subject><isbn>1424450829</isbn><isbn>9781424450824</isbn><isbn>0769538290</isbn><isbn>9780769538297</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjL1OwzAURo1QJejPzMDiF0i49rWdemCIEgqVWpWhsFaO7VRGIUGxM_D2FMG3nHOWj5A7BjljoB_K-r067F9zDqBzFFdkDoXSEtdcwzWZM8GFkHCpG7KK8QMuE5Ijx1vyWIeYxtBMyTu67dM4xTD0tPbJ2_RroadVN0wu0rcY-jPdD03oPC3Pvk9xSWat6aJf_XNBjpunY_WS7Q7P26rcZYEVMmW6sWBZIyWg0dYCOgmcWa3WwK0pGmXQMKd0K1rWCtBOgHCouFIcsRC4IPd_t8F7f_oaw6cZv08SpZYg8QdwCUc2</recordid><startdate>200910</startdate><enddate>200910</enddate><creator>Dastjerdi, A.V.</creator><creator>Bakar, K.A.</creator><creator>Tabatabaei, S.G.H.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200910</creationdate><title>Distributed Intrusion Detection in Clouds Using Mobile Agents</title><author>Dastjerdi, A.V. ; Bakar, K.A. ; Tabatabaei, S.G.H.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-9bc0c1b5503a9cc03d5021c96802ca7b6a3a1d69f4f1f409d404d36266233743</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Cloud computing</topic><topic>Costs</topic><topic>Distributed computing</topic><topic>Economies of scale</topic><topic>Grid computing</topic><topic>Hardware</topic><topic>Intrusion detection</topic><topic>Intrusion Detection System</topic><topic>Mobile Agent</topic><topic>Mobile agents</topic><topic>Scalability</topic><topic>Turing machines</topic><toplevel>online_resources</toplevel><creatorcontrib>Dastjerdi, A.V.</creatorcontrib><creatorcontrib>Bakar, K.A.</creatorcontrib><creatorcontrib>Tabatabaei, S.G.H.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dastjerdi, A.V.</au><au>Bakar, K.A.</au><au>Tabatabaei, S.G.H.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Distributed Intrusion Detection in Clouds Using Mobile Agents</atitle><btitle>2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences</btitle><stitle>ADVCOMP</stitle><date>2009-10</date><risdate>2009</risdate><spage>175</spage><epage>180</epage><pages>175-180</pages><isbn>1424450829</isbn><isbn>9781424450824</isbn><eisbn>0769538290</eisbn><eisbn>9780769538297</eisbn><abstract>Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private cloud into public cloud is security. This work tries to offer a line of defense by applying mobile agents technology to provide intrusion detection for cloud applications regardless of their locations. Therefore, CIOs feel safer to use cloud to extend their on-premise infrastructure by adding capacity on demand.</abstract><pub>IEEE</pub><doi>10.1109/ADVCOMP.2009.34</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1424450829
ispartof 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences, 2009, p.175-180
issn
language eng
recordid cdi_ieee_primary_5359505
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Cloud computing
Costs
Distributed computing
Economies of scale
Grid computing
Hardware
Intrusion detection
Intrusion Detection System
Mobile Agent
Mobile agents
Scalability
Turing machines
title Distributed Intrusion Detection in Clouds Using Mobile Agents
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T18%3A34%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Distributed%20Intrusion%20Detection%20in%20Clouds%20Using%20Mobile%20Agents&rft.btitle=2009%20Third%20International%20Conference%20on%20Advanced%20Engineering%20Computing%20and%20Applications%20in%20Sciences&rft.au=Dastjerdi,%20A.V.&rft.date=2009-10&rft.spage=175&rft.epage=180&rft.pages=175-180&rft.isbn=1424450829&rft.isbn_list=9781424450824&rft_id=info:doi/10.1109/ADVCOMP.2009.34&rft.eisbn=0769538290&rft.eisbn_list=9780769538297&rft_dat=%3Cieee_6IE%3E5359505%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-9bc0c1b5503a9cc03d5021c96802ca7b6a3a1d69f4f1f409d404d36266233743%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5359505&rfr_iscdi=true