Loading…

CIDS: A Framework for Intrusion Detection in Cloud Systems

By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for "CIDS" a cloud based intrusion detection system, to solve the deficiencies of current IDSs. CIDS also provides a component to summarize the alert...

Full description

Saved in:
Bibliographic Details
Main Authors: Kholidy, H. A., Baiardi, F.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 385
container_issue
container_start_page 379
container_title
container_volume
creator Kholidy, H. A.
Baiardi, F.
description By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for "CIDS" a cloud based intrusion detection system, to solve the deficiencies of current IDSs. CIDS also provides a component to summarize the alerts and inform the cloud administrator. CIDS architecture is scalable and elastic with no central coordinator. This paper describes the components, architecture, detection models, and advantages of CIDS.
doi_str_mv 10.1109/ITNG.2012.94
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6209182</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6209182</ieee_id><sourcerecordid>6209182</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-cab0441f5a2a2e36832d8d2a84eac3b0eabde5923a3f6f0e305f757ec3bc6e303</originalsourceid><addsrcrecordid>eNotjM1Kw0AYRUdEUGp27tzMCyR-85P56a6ktgaKLpp9mSTfwGCTyEyK9O2t2tW5hwuHkCcGBWNgX-rmfVtwYLyw8oZkVhvQypZSlVLe_jmTSgvQ1uh7kqUUWuBKK2U0eyDLql7vl3RFN9EN-D3FT-qnSOtxjqcUppGuccZu_l1hpNVxOvV0f04zDumR3Hl3TJhduSDN5rWp3vLdx7auVrs8WJjzzrUgJfOl446jUEbw3vTcGYmuEy2ga3ssLRdOeOUBBZRelxovX6cuJhbk-T8bEPHwFcPg4vmgOFhmuPgByYhHog</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>CIDS: A Framework for Intrusion Detection in Cloud Systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kholidy, H. A. ; Baiardi, F.</creator><creatorcontrib>Kholidy, H. A. ; Baiardi, F.</creatorcontrib><description>By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for "CIDS" a cloud based intrusion detection system, to solve the deficiencies of current IDSs. CIDS also provides a component to summarize the alerts and inform the cloud administrator. CIDS architecture is scalable and elastic with no central coordinator. This paper describes the components, architecture, detection models, and advantages of CIDS.</description><identifier>ISBN: 9781467307987</identifier><identifier>ISBN: 146730798X</identifier><identifier>EISBN: 9780769546544</identifier><identifier>EISBN: 0769546544</identifier><identifier>DOI: 10.1109/ITNG.2012.94</identifier><language>eng</language><publisher>IEEE</publisher><subject>attacks ; Cloud computing ; Detectors ; Intrusion detection ; masquerade ; Peer to peer computing ; security</subject><ispartof>2012 Ninth International Conference on Information Technology - New Generations, 2012, p.379-385</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6209182$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6209182$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kholidy, H. A.</creatorcontrib><creatorcontrib>Baiardi, F.</creatorcontrib><title>CIDS: A Framework for Intrusion Detection in Cloud Systems</title><title>2012 Ninth International Conference on Information Technology - New Generations</title><addtitle>itng</addtitle><description>By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for "CIDS" a cloud based intrusion detection system, to solve the deficiencies of current IDSs. CIDS also provides a component to summarize the alerts and inform the cloud administrator. CIDS architecture is scalable and elastic with no central coordinator. This paper describes the components, architecture, detection models, and advantages of CIDS.</description><subject>attacks</subject><subject>Cloud computing</subject><subject>Detectors</subject><subject>Intrusion detection</subject><subject>masquerade</subject><subject>Peer to peer computing</subject><subject>security</subject><isbn>9781467307987</isbn><isbn>146730798X</isbn><isbn>9780769546544</isbn><isbn>0769546544</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjM1Kw0AYRUdEUGp27tzMCyR-85P56a6ktgaKLpp9mSTfwGCTyEyK9O2t2tW5hwuHkCcGBWNgX-rmfVtwYLyw8oZkVhvQypZSlVLe_jmTSgvQ1uh7kqUUWuBKK2U0eyDLql7vl3RFN9EN-D3FT-qnSOtxjqcUppGuccZu_l1hpNVxOvV0f04zDumR3Hl3TJhduSDN5rWp3vLdx7auVrs8WJjzzrUgJfOl446jUEbw3vTcGYmuEy2ga3ssLRdOeOUBBZRelxovX6cuJhbk-T8bEPHwFcPg4vmgOFhmuPgByYhHog</recordid><startdate>201204</startdate><enddate>201204</enddate><creator>Kholidy, H. A.</creator><creator>Baiardi, F.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201204</creationdate><title>CIDS: A Framework for Intrusion Detection in Cloud Systems</title><author>Kholidy, H. A. ; Baiardi, F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-cab0441f5a2a2e36832d8d2a84eac3b0eabde5923a3f6f0e305f757ec3bc6e303</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>attacks</topic><topic>Cloud computing</topic><topic>Detectors</topic><topic>Intrusion detection</topic><topic>masquerade</topic><topic>Peer to peer computing</topic><topic>security</topic><toplevel>online_resources</toplevel><creatorcontrib>Kholidy, H. A.</creatorcontrib><creatorcontrib>Baiardi, F.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore (Online service)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kholidy, H. A.</au><au>Baiardi, F.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>CIDS: A Framework for Intrusion Detection in Cloud Systems</atitle><btitle>2012 Ninth International Conference on Information Technology - New Generations</btitle><stitle>itng</stitle><date>2012-04</date><risdate>2012</risdate><spage>379</spage><epage>385</epage><pages>379-385</pages><isbn>9781467307987</isbn><isbn>146730798X</isbn><eisbn>9780769546544</eisbn><eisbn>0769546544</eisbn><abstract>By impersonating legitimate users, intruders can use the abundant resources of cloud computing environments. This paper develops a framework for "CIDS" a cloud based intrusion detection system, to solve the deficiencies of current IDSs. CIDS also provides a component to summarize the alerts and inform the cloud administrator. CIDS architecture is scalable and elastic with no central coordinator. This paper describes the components, architecture, detection models, and advantages of CIDS.</abstract><pub>IEEE</pub><doi>10.1109/ITNG.2012.94</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781467307987
ispartof 2012 Ninth International Conference on Information Technology - New Generations, 2012, p.379-385
issn
language eng
recordid cdi_ieee_primary_6209182
source IEEE Electronic Library (IEL) Conference Proceedings
subjects attacks
Cloud computing
Detectors
Intrusion detection
masquerade
Peer to peer computing
security
title CIDS: A Framework for Intrusion Detection in Cloud Systems
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T12%3A00%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=CIDS:%20A%20Framework%20for%20Intrusion%20Detection%20in%20Cloud%20Systems&rft.btitle=2012%20Ninth%20International%20Conference%20on%20Information%20Technology%20-%20New%20Generations&rft.au=Kholidy,%20H.%20A.&rft.date=2012-04&rft.spage=379&rft.epage=385&rft.pages=379-385&rft.isbn=9781467307987&rft.isbn_list=146730798X&rft_id=info:doi/10.1109/ITNG.2012.94&rft.eisbn=9780769546544&rft.eisbn_list=0769546544&rft_dat=%3Cieee_6IE%3E6209182%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-cab0441f5a2a2e36832d8d2a84eac3b0eabde5923a3f6f0e305f757ec3bc6e303%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6209182&rfr_iscdi=true