Abstract
A host-based intrusion detection system for Cloud environment is reported in this chapter along with its laboratory analysis. This module alerts the Cloud user against the malicious activities within the system by analysing the system call traces. It analyses only selective system call traces, the failed system call trace, rather than all. This module provides an early detection of the intrusion and works as the security to the infrastructure layer of the Cloud environment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sequeira, D.: Intrusion Prevention Systems-Security’s Silver Bullet? SANS Institute InfoSec Reading Room (2002). Available at: http://www.sans.org/reading_room/whitepapers/detection/intrusionprevention_systes_securitys_bullet_366?show = 366.php\&cat = detection
Ludwig, S., Bauer, K.: Immune network algorithm applied to the optimization of composite SaaS in cloud computing. In: IEEE Congress on Evolutionary Computation, Sendai, Japan, pp. 3042–3048, May 2015
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
Anderson, J.: Computer Security Threat Monitoring and Surveillance, Technical report. Available at: http://csrc.nist.gov/publications/history/ande80.pdf
Denning, D.: An intrusion detection model. IEEE Trans. Software Eng. 13(2), 222–232 (1987)
Lee, W., Stolfo, S., Chan, P.: Learning Patterns from UNIX Process Execution Traces for Intrusion Detection, pp. 50–56. AAAI Press, July 1997
Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, pp. 133–145, May 1999
Payne, T., Edwards, P., Green, C.: Experience with rule induction and k-nearest neighbor methods for interface agents that learn. IEEE Trans. Knowl. Data Eng. 9(2), 329–335 (2002)
Ghosh, A., Schwartzbard, A., Shatz, A.: Learning program behavior profiles for intrusion detection. In: Proceedings of Ist USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, USA, vol. 1, pp. 1–13, Apr 1999
Rawat, S., Gulati, V., Pujari, A., Vemuri, V.: Intrusion detection using text processing techniques with a binary-weighted cosine metric. J. Inf. Assur. Secur. 1, 43–50 (2007)
Forrest, S., Hofmeyr, A., Somayaji, A., Longsta, T.: A sense of self for Unix processes. In: IEEE Symposium on Security and Privacy, Oakland, CA, pp. 120–128, May 1996
Wespi, A., Dacier, M., Debar, H.: Intrusion detection using variable length audit trail patterns. Recent Adv. Intrusion Detect. 1907, 110–129 (2000)
Tandon, G., Chan, P.: Learning useful system call attributes for anomaly detection. In: Proceedings of the 18th International Artificial Intelligence Research Society Conference, Florida, pp. 405–410 (2005)
Vokorokos, L., Balaz, A.: Host-based intrusion detection system. In: 14th International Conference on Intelligent Engineering Systems, Spain, pp. 43–47, May 2010
Barbhuiya, F., Biswas, S., Nandi, S.: An active host-based intrusion detection system for ARP-related attacks and its verification. Int. J. Netw. Secur. Appl. 3(3), 163–180 (2011)
Cai, L., Chen, J., Ke, Y., Chen, T., Li, Z.: A new data normalization method for unsupervised anomaly intrusion detection. J. Zhejiang Univ. Sci. C 11(10), 778–784 (2010)
Doelitzscher, F., Reich, C., Knahl, M., Passfall, A., Clarke, N.: An agent based business aware incident detection system for cloud environments. J. Cloud Comput. Adv. Syst. Appl. 1(9), 1–19 (2012)
Htun, P., Khaing, K.: Important roles of data mining techniques for anomaly intrusion detection system. Int. J. Adv. Res. Comput. Eng. Technol. 2(5), 1850–1854 (2013)
KDD 99 datasets, The UCI KDD Archive, Irvine, CA, USA (1999). Available at: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Deshpande, P., Sharma, S., Peddoju, S.K.: Deploying a private cloud: go through the errors first. In: Proceedings of Conference on Advances in Communication and Control Systems, Deharadun, India, pp. 638–641, Apr 2013
Aggarwal, C., Zhai, C.: A survey of text classification algorithms. In: Mining Text Data, pp. 163–222 (2012)
Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861–874 (2006)
Deshpande, P., Sharma, S.C., Peddoju, S.K., et al.: HIDS: a host based intrusion detection system for cloud computing environment. Int. J. Syst. Assur. Eng. Manag. 9, 567 (2018)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Deshpande, P.S., Sharma, S.C., Peddoju, S.K. (2019). A Host-Based Intrusion Detection System. In: Security and Data Storage Aspect in Cloud Computing. Studies in Big Data, vol 52. Springer, Singapore. https://doi.org/10.1007/978-981-13-6089-3_2
Download citation
DOI: https://doi.org/10.1007/978-981-13-6089-3_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6088-6
Online ISBN: 978-981-13-6089-3
eBook Packages: EngineeringEngineering (R0)