Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A new Distributed Intrusion Detection System Based on Multi-agent System for Cloud Environment.
Author(s):
1. Omar Achbarou: Computer Science Dept, Laboratory ISI, Cadi Ayyad University, Morocco
2. My Ahmed El Kiram: Computer Science Dept, Laboratory ISI, Cadi Ayyad University, Morocco
3. Outmane Bourkoukou: Computer Science Dept, Laboratory ISI, Cadi Ayyad University, Morocco
4. Salim Elbouanani: Computer Science Dept, Laboratory ISI, Cadi Ayyad University, Morocco
Abstract:
Cloud computing, like any distributed computing system, is continually exposed to many threats and attacks of various origins. Thus, cloud security is now a very important concern for both providers and users. Intrusion detection systems (IDSs) are used to detect attacks in this environment. The goal of security administrators (for both customers and providers) is to prevent and detect attacks while avoiding disruption of the smooth operation of the cloud. Making IDSs efficient is not an easy task in a distributed environment such as the cloud. This problem remains open, and to our knowledge, there are no satisfactory solutions for the automated evaluation and analysis of cloud security. The features of the multi-agent system paradigm, such as adaptability, collaboration, and distribution, make it possible to handle this evolution of cloud computing in an efficient and controlled manner. As a result, multi-agent systems are well suited to the effective management of cloud security. In this paper, we propose an efficient, reliable and secure distributed IDS (DIDS) based on a multi-agent approach to identify and prevent new and complex malicious attacks in this environment. Moreover, some experiments were conducted to evaluate the performance of our model.
Page(s): 526-533
DOI: DOI not available
Published: Journal: International Journal of Communication Networks and Information Security, Volume: 10, Issue: 3, Year: 2018
Keywords:
Keywords are not available for this article.
References:
[1] M.Ramachandran,V.Chang,Int. J.Inf, 2016.Towards performance evaluation of cloud service providers for cloud data security,”, 36 618 -625
[2] Y. A.Mohamed,A. B.Abdullah, 2010.Implementation of IDS with response for securing MANETs,”,in Proceedings 2010 International Symposium on Information Technology - Engineering Technology, ITSim'10 -
[3] K.Venkataramana,M.Padmavathamma, .“Multi-agent Intrusion Detection and Prevention System for Cloud Environment,”,Int. J. Comput. Appl. 49 -
[4] 2012., 29 -
[5] Z.Chang,Y. L.Zhu, 2011.The design of wireless intrusion detection system based on immune algorithm,”,in International Conference on Machine Learning and Cybernetics -
[6] P.Singh,Hada,R.Singh,and M.Manmohan Meghwal,Int, 2011.,J. Comput. Appl. 36 975 -8887
[7] C.Saadi,H.Chaoui,Clust, 2016.Cloud Computing Security Using IDS-AM-, 85 433 -442
[8] A. V.Dastjerdi,K. A.Bakar,S. G. H.Tabatabaei, 2009.Distributed Intrusion Detection in Clouds Using Mobile Agents, -
[9] H.Toumi,A.Talea,B.Marzak,A.Eddaoui,M.Talea,Int. J. Commun. NetworksInf, 2015.Cooperative trust framework for cloud computing based on mobile agents,”, -
[10] H.Wang,H.Zhou,C.Wang,J.Comput, 2012.Virtual Machine-based Intrusion Detection System Framework in Cloud Computing Environment,”, 7 -
[11] H.Idrissi,M.Ennahbaoui,E. M.Souidi,S.El,Hajji, 2015.Mobile Agents with Cryptographic Traces for Intrusion Detection in the Cloud Computing, 73 179 -186
[12] N. AfzaliSeresht,R.Azmi, 2014.MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach, 35 286 -298
[13] Technol. Lab., 2011., 145 7 -
[14] Artif. Intell., 2017., -
[15] Netw, 2016.,Comput. Appl. 75 200 -222
[16] S.Subashini,V.Kavitha, 2011.A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications 34 1 -11
[17] A.Patcha,J. M.Park, 2007.An overview of anomaly detection techniques: Existing solutions and latest technological trends,” Comput. Networks 51 3448 -3470
[18] A.Patel,M.Taghavi,K.Bakhtiyari,J. CelestinoJúnior, .An intrusion detection and prevention system in cloud computing: A systematic review,” Journal of Network and Computer Applications 36 -
[19] C.Modi,D.Patel,B.Borisaniya,H.Patel,A.Patel,M.Rajarajan,J.Netw, 2013.A survey of intrusion detection techniques in Cloud,”,Comput. Appl. 36 42 -57
[20] Netw, 2012.,Comput. Appl. 36 16 -24
[21] Sci., 2016., 6 -
[22] Silva , E.,Costa , and R.,Santos, 2012.A survey of security in multi-agent systems,” Expert Systems with Applications 39 4835 -4846
[23] Z. A.Baig, .“Multi-agent systems for protecting critical infrastructures: A survey,” Journal of Network and Computer Applications 35 1151 -1161
[24] H. Toumi, A. Talea, B. Marzak, A. Eddaoui, and M. Talea, “Cooperative trust framework for cloud computing based on mobile agents,” Int. J. Commun. Networks Inf. Secur., 2015.
[25] F. Bellifemine, G. Caire, A. Poggi, and G. Rimassa, “JADE: A software framework for developing multi-agent applications. Lessons learned,” Inf. Softw. Technol., vol. 50, no. 1-2, pp. 10-21, 2008
[26] P. Shinde and T. J. Parvat, “DDoS Attack Analyzer: Using JPCAP and WinCap,” in Procedia Computer Science, 2016, vol. 79, pp. 781-784.
[27] C. J. Su, “Mobile multi-agent based, distributed information platform (MADIP) for wide-area e-health monitoring,” Comput. Ind., vol. 59, no. 1, pp. 55-68, 2008
[28] G. Fortino, A. Garro, and W. Russo, “Achieving Mobile Agent Systems interoperability through software layering,” Inf. Softw. Technol., vol. 50, no. 4, pp. 322-341, 2008.
[29] G. P. Spathoulas and S. K. Katsikas, “Reducing false positives in intrusion detection systems,” Comput. Secur., vol. 29, no. 1, pp. 35-44, 2010.
[30] L. Cazorla, C. Alcaraz, and J. Lopez, “A three-stage analysis of IDS for critical infrastructures,” Comput. Secur., vol. 55, pp. 235-250, 2015
Citations
Citations are not available for this document.
0

Citations

0

Downloads

11

Views