Nathiya, T. and Suseendran, G. (2019) An Effective Hybrid Intrusion Detection System for Use in Security Monitoring in the Virtual Network Layer of Cloud Computing Technology. In: Data Management, Analytics and Innovation. Springer Link, pp. 483-497.
![[thumbnail of 10.1007978-981-13-1274-836.pdf]](https://ir.vistas.ac.in/style/images/fileicons/archive.png)
10.1007978-981-13-1274-836.pdf
Download (465kB)
Abstract
Security in the cloud computing environment is very important in the detection of intrusions into the virtual network layer. Denial of service (DoS) and distributed denial of service (DDoS) attacks are the main threats to cloud computing, and it is therefore crucial to protect against these types of intrusive attack. In this chapter, the effective monitoring of security by a hybrid intrusion detection system (H-IDS) in the virtual network layer of cloud computing technology is discussed and a detailed view of insider and outsider attackers in the virtual network layer is provided. This framework splits into four layers, namely virtual machine layer, node layer, cloud cluster layer, and cloud layer. Signature and anomaly techniques are used to detect known as well as unknown attacks and all virtual machine (VM) host systems which are available in the cloud computing environment are considered. The cloud cluster layer uses a correlation module (CM) to detect distributed attacks, and the Dempster-Shafer theory (DST) is employed in the final decision-making phase of the intrusion detection system (IDS) in order to improve its accuracy.
Item Type: | Book Section |
---|---|
Subjects: | Computer Science > Cyber Security |
Divisions: | Computer Science |
Depositing User: | Mr IR Admin |
Date Deposited: | 02 Oct 2024 11:53 |
Last Modified: | 02 Oct 2024 11:53 |
URI: | https://ir.vistas.ac.in/id/eprint/8265 |