Loading…
CIDS: A Framework for Intrusion Detection in Cloud Systems
By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for "CIDS" a cloud based intrusion detection system, to solve the deficiencies of current IDSs. CIDS also provides a component to summarize the alert...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 385 |
container_issue | |
container_start_page | 379 |
container_title | |
container_volume | |
creator | Kholidy, H. A. Baiardi, F. |
description | By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for "CIDS" a cloud based intrusion detection system, to solve the deficiencies of current IDSs. CIDS also provides a component to summarize the alerts and inform the cloud administrator. CIDS architecture is scalable and elastic with no central coordinator. This paper describes the components, architecture, detection models, and advantages of CIDS. |
doi_str_mv | 10.1109/ITNG.2012.94 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6209182</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6209182</ieee_id><sourcerecordid>6209182</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-cab0441f5a2a2e36832d8d2a84eac3b0eabde5923a3f6f0e305f757ec3bc6e303</originalsourceid><addsrcrecordid>eNotjM1Kw0AYRUdEUGp27tzMCyR-85P56a6ktgaKLpp9mSTfwGCTyEyK9O2t2tW5hwuHkCcGBWNgX-rmfVtwYLyw8oZkVhvQypZSlVLe_jmTSgvQ1uh7kqUUWuBKK2U0eyDLql7vl3RFN9EN-D3FT-qnSOtxjqcUppGuccZu_l1hpNVxOvV0f04zDumR3Hl3TJhduSDN5rWp3vLdx7auVrs8WJjzzrUgJfOl446jUEbw3vTcGYmuEy2ga3ssLRdOeOUBBZRelxovX6cuJhbk-T8bEPHwFcPg4vmgOFhmuPgByYhHog</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>CIDS: A Framework for Intrusion Detection in Cloud Systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kholidy, H. A. ; Baiardi, F.</creator><creatorcontrib>Kholidy, H. A. ; Baiardi, F.</creatorcontrib><description>By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for "CIDS" a cloud based intrusion detection system, to solve the deficiencies of current IDSs. CIDS also provides a component to summarize the alerts and inform the cloud administrator. CIDS architecture is scalable and elastic with no central coordinator. This paper describes the components, architecture, detection models, and advantages of CIDS.</description><identifier>ISBN: 9781467307987</identifier><identifier>ISBN: 146730798X</identifier><identifier>EISBN: 9780769546544</identifier><identifier>EISBN: 0769546544</identifier><identifier>DOI: 10.1109/ITNG.2012.94</identifier><language>eng</language><publisher>IEEE</publisher><subject>attacks ; Cloud computing ; Detectors ; Intrusion detection ; masquerade ; Peer to peer computing ; security</subject><ispartof>2012 Ninth International Conference on Information Technology - New Generations, 2012, p.379-385</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6209182$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6209182$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kholidy, H. A.</creatorcontrib><creatorcontrib>Baiardi, F.</creatorcontrib><title>CIDS: A Framework for Intrusion Detection in Cloud Systems</title><title>2012 Ninth International Conference on Information Technology - New Generations</title><addtitle>itng</addtitle><description>By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for "CIDS" a cloud based intrusion detection system, to solve the deficiencies of current IDSs. CIDS also provides a component to summarize the alerts and inform the cloud administrator. CIDS architecture is scalable and elastic with no central coordinator. This paper describes the components, architecture, detection models, and advantages of CIDS.</description><subject>attacks</subject><subject>Cloud computing</subject><subject>Detectors</subject><subject>Intrusion detection</subject><subject>masquerade</subject><subject>Peer to peer computing</subject><subject>security</subject><isbn>9781467307987</isbn><isbn>146730798X</isbn><isbn>9780769546544</isbn><isbn>0769546544</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjM1Kw0AYRUdEUGp27tzMCyR-85P56a6ktgaKLpp9mSTfwGCTyEyK9O2t2tW5hwuHkCcGBWNgX-rmfVtwYLyw8oZkVhvQypZSlVLe_jmTSgvQ1uh7kqUUWuBKK2U0eyDLql7vl3RFN9EN-D3FT-qnSOtxjqcUppGuccZu_l1hpNVxOvV0f04zDumR3Hl3TJhduSDN5rWp3vLdx7auVrs8WJjzzrUgJfOl446jUEbw3vTcGYmuEy2ga3ssLRdOeOUBBZRelxovX6cuJhbk-T8bEPHwFcPg4vmgOFhmuPgByYhHog</recordid><startdate>201204</startdate><enddate>201204</enddate><creator>Kholidy, H. A.</creator><creator>Baiardi, F.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201204</creationdate><title>CIDS: A Framework for Intrusion Detection in Cloud Systems</title><author>Kholidy, H. A. ; Baiardi, F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-cab0441f5a2a2e36832d8d2a84eac3b0eabde5923a3f6f0e305f757ec3bc6e303</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>attacks</topic><topic>Cloud computing</topic><topic>Detectors</topic><topic>Intrusion detection</topic><topic>masquerade</topic><topic>Peer to peer computing</topic><topic>security</topic><toplevel>online_resources</toplevel><creatorcontrib>Kholidy, H. A.</creatorcontrib><creatorcontrib>Baiardi, F.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore (Online service)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kholidy, H. A.</au><au>Baiardi, F.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>CIDS: A Framework for Intrusion Detection in Cloud Systems</atitle><btitle>2012 Ninth International Conference on Information Technology - New Generations</btitle><stitle>itng</stitle><date>2012-04</date><risdate>2012</risdate><spage>379</spage><epage>385</epage><pages>379-385</pages><isbn>9781467307987</isbn><isbn>146730798X</isbn><eisbn>9780769546544</eisbn><eisbn>0769546544</eisbn><abstract>By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for "CIDS" a cloud based intrusion detection system, to solve the deficiencies of current IDSs. CIDS also provides a component to summarize the alerts and inform the cloud administrator. CIDS architecture is scalable and elastic with no central coordinator. This paper describes the components, architecture, detection models, and advantages of CIDS.</abstract><pub>IEEE</pub><doi>10.1109/ITNG.2012.94</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781467307987 |
ispartof | 2012 Ninth International Conference on Information Technology - New Generations, 2012, p.379-385 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6209182 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | attacks Cloud computing Detectors Intrusion detection masquerade Peer to peer computing security |
title | CIDS: A Framework for Intrusion Detection in Cloud Systems |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T12%3A00%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=CIDS:%20A%20Framework%20for%20Intrusion%20Detection%20in%20Cloud%20Systems&rft.btitle=2012%20Ninth%20International%20Conference%20on%20Information%20Technology%20-%20New%20Generations&rft.au=Kholidy,%20H.%20A.&rft.date=2012-04&rft.spage=379&rft.epage=385&rft.pages=379-385&rft.isbn=9781467307987&rft.isbn_list=146730798X&rft_id=info:doi/10.1109/ITNG.2012.94&rft.eisbn=9780769546544&rft.eisbn_list=0769546544&rft_dat=%3Cieee_6IE%3E6209182%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-cab0441f5a2a2e36832d8d2a84eac3b0eabde5923a3f6f0e305f757ec3bc6e303%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6209182&rfr_iscdi=true |