INTRUSION DEFENSE MECHANISM USING ARTIFICIAL IMMUNE SYSTEM IN CLOUD COMPUTING (CLOUD SECURITY USING COMPUTATIONAL INTELLIGENCE)
DOI:
https://doi.org/10.22159/ajpcr.2017.v10s1.19602Keywords:
Artificial immune system, Cloud security, Computational intelligenceAbstract
Cloud is a general term used in organizations that host various service and deployment models. As cloud computing offers everything a service,
it suffers from serious security issues. In addition, the multitenancy facility in the cloud provides storage in the third party data center which is considered to be a serious threat. These threats can be faced by both self-providers and their customers. Hence, the complexity of the security should be increased to a great extend such that it has an effective defense mechanism. Although data isolation is one of the remedies, it could not be a total solution. Hence, a complete architecture is proposed to provide complete defense mechanism. This defense mechanism ensures that the threats are blocked before it invades into the cloud environment. Therefore, we adopt the mechanism called artificial immune system which is derived from biologically inspired computing. This security strategy is based on artificial immune algorithm.
Â
Downloads
References
Available from: http://www.en.wikipedia.org/wiki/Cloud_Computing.
Sangkatsanee P, Wattanapongsakorn N, Charnsripinyo C. Practical realtime intrusion detection using machine learning approaches. Comput Commun 2011;34(8):2227-35.
Elshoush HT. Alert correlation in collaborative intelligent intrusion detection systems-a survey. Appl Softw Comput 2011;11:4349-65.
Kuzhalisai M, Gayathri G. Enhanced security in cloud with multilevel intrusion detection system. Int J Comput Commun Technol 2012;3(3):66-9.
Modi C, Patel D, Borisanya B, Patel A, Rajarajan M. A novel framework for intrusion detection in cloud. ACM, International Conference on Security of Information and Networks; 2012. p. 67-74.
Zarrabi A. Internet intrusion detection system service in a cloud. Int J Comput Sci 2012;9(5):308-15.
Gonzalez N, Miers C. Top threats to cloud computing. A quantitative analysis of current security concerns and solutions for cloud computing.Cloud Security Alliance; 2012.
Tanase M. The Future of IDS; 2001. Available from: http://www. securityfocus.com/infocus/1520.
Debar H, Becker M, Siboni D. A neural network component for an intrusion detection system. In: Proceedings. IEEE Computer Society Symposium; 1992. p. 240-50.
Available from: http://www.nvd.nist.gov/CVSS/v2-calculator#score.
Yan X, De-ming Z. Research on network security evaluation based on fuzzy method. Meas Control Technol 2009;28(2):79-82.
Dongmei Z, Yuqing Z, Jianfeng MA. Fuzzy Risk Assessment of Entropy Weight Coefficient Method Applied in Network Security; 1997.
Prowell S, Kraus R, Borkin M. Seven Deadliest Network Attacks. 1st ed. Burlington: Syngress Publishers; 2010.
Shun-Chieh L, Tseng SS. Constructing detection knowledge for DDoS intrusion tolerance. Int J Expert Syst Appl 2004;27(3):379-90.
Leland WE, Taqqu MS, Willinger W, Wilson DV. On the self-similar nature of ethernet traffic (extended version). IEEE/ACM Trans Netw 1994;2(1):1-15.
Jose N. Politically motivated denial of service attacks. In: Czosseck C, Geers K, editors. The Virtual Battlefield: Perspectives on Cyber Warfare. Amsterdam: IOS Press; 2009. p. 163-81.
Segura V, Lahuerta J. Modeling the economic incentives of DDoS attacks: Femtocell case study. In: Economics of Information Security and Privacy. US: Springer US Publishers; 2010. p. 107-19.
Published
How to Cite
Issue
Section
The publication is licensed under CC By and is open access. Copyright is with author and allowed to retain publishing rights without restrictions.