Ahmad, Azuan and Zainudin, Wan Shafiuddin and Kama, Mohd Nazri and Idris, Norbik Bashah and Mohd Saudi, Madihah (2018) Cloud co-residency denial of service threat detection inspired by artificial immune system. In: 2018 Artificial Intelligence and Cloud Computing Conference (AICCC 2018), 21st-23rd December 2018, Tokyo, Japan. (Unpublished)
PDF
- Submitted Version
Restricted to Registered users only Download (512kB) | Request a copy |
|
PDF
- Supplemental Material
Restricted to Registered users only Download (545kB) | Request a copy |
Abstract
Cloud computing introduces concerns about data protection and intrusion detection mechanism. A review of the literature shows that there is still a lack of works on cloud IDS that focused on implementing real-time hybrid detections using Dendritic Cell algorithm (DCA) as a practical approach. In addition, there is also lack of specific threat detection built to detect intrusions targeting cloud computing environment where current implementations still using traditional open source or enterprise IDS to detect threats targeting cloud computing environment. Cloud implementations also introduce a new term, "co-residency" attack and lack of research focusing on detecting this type of attack. This research aims to provide a hybrid intrusion detection model for Cloud computing environment. For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud CoResidency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. This research also proposed a method in detecting co-residency attacks. In this paper the co-residency attack detection model was proposed and tested until satisfactory results were obtained with the datasets. The experiment was conducted in a controlled environment and conducted using custom generated co-residency denial of service attacks for testing the capability of the proposed model in detecting novel co-residency attacks. The results show that the proposed model was able to detect most of the types of attacks that conducted during the experiment. From the experiment, the CCTD model has been shown to improve DCA previously used to solve similar problem
Item Type: | Conference or Workshop Item (Invited Papers) |
---|---|
Additional Information: | 8123/69608 |
Uncontrolled Keywords: | Cloud computing, intrusion detection |
Subjects: | T Technology > T Technology (General) T Technology > T Technology (General) > T10.5 Communication of technical information |
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Information and Communication Technology > Department of Computer Science Kulliyyah of Information and Communication Technology > Department of Computer Science Kulliyyah of Information and Communication Technology Kulliyyah of Information and Communication Technology |
Depositing User: | Prof Dato' Dr Norbik Bashah Idris |
Date Deposited: | 18 Feb 2019 09:20 |
Last Modified: | 18 Feb 2019 09:20 |
URI: | http://irep.iium.edu.my/id/eprint/69608 |
Actions (login required)
View Item |