Skip to main content

Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment

  • Conference paper
  • First Online:
Proceedings of International Conference on Internet Computing and Information Communications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 216))

Abstract

Security requires user authentication with password digital certificates and confidentiality for transmission of data in a distributed system. The Intrusion Detection System (IDS) detect intrusions by means of knowledge and behavior analysis. In this paper, we introduce concept called cloud computing to increase data efficiency and satisfies user request. We also include grid computing to make cloud computing more efficient, reliable, and increase the performance of the systems that are accessing server. This is because of more user logins at the same time and the server is not able to provide equal performance to all other system. We can achieve performance by getting performance from the system that are connected to server and providing it to system that accessing the server.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chaboya, D.J., Raines, R.A., Baldwin, R.O., Mullins, B.E.: Network intrusion detection: automated and manual method prone to attack and evaton. IEEE Secur. Priv. 4, 36–43 (2006)

    Google Scholar 

  2. Overill, R.E.: Intrusion detection systems: threats, taxonomy, tuning. J. Finan. Crim. 6, 49–51 (1998)

    Google Scholar 

  3. Smarr, L., Catlett, C.E.: Meta computing. Commun. ACM 35, 44–52 (1992)

    Google Scholar 

  4. Schulter, A.: Intrusion detection for computational grids. Proceedings of 2nd International 2nd Conference on new technologies, mobility, and security, Tangier - Morocco, pp. 1–5. IEEE Press, (2008)

    Google Scholar 

  5. Bolosky, W.J., Douceur, J.R., Ely, D., Theimer, M.: Feasibility of a serverless distributed file 284 system deployed on an existing set of desktop PCs, SIGMETRICS, ACM, Performance Evaluation 285 Review, 34–43 (2000). http://dl.acm.org/citation.cfm?doid=339331.339345

  6. Idris, N.B., Shanmugam, B.: Indicon. Annual IEEE, pp. 52–55, 2005. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1590122&punumber%3D10601

  7. Cuppens, F., Gombault, S.: Thierry Sans: selecting appropriate counter-measures in an intrusion detection framework. In: Proceedings of the 17th IEEE workshop on computer security foundations, pp. 78–80, 2004. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1310733&sortType%3Dasc_p_Sequence%26filter%3DAND%28p_IS_Number%3A29101%29

  8. Zhang, G.Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. ACM J. Wirel. Netw. 9, 545–546 (2003)

    Article  Google Scholar 

  9. Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 222–232 (1987)

    Google Scholar 

  10. Li, T., Song, M., Alam, M.: Compromized sensor node detection: a quantitative approach. In: Proceedings of the IEEE international conference on distributed computing systems, pp. 352–357, 2008.

    Google Scholar 

  11. Shapiro, M.: Structure and encapsulation in distributed systems: the proxy principle, Proc. 6th Int. Conf. on Distributed Computing Systems(ICDCS), Cambridge MA (USA), pp. 198–204, 1986

    Google Scholar 

  12. Lunt, Teresa F.: “IDES: An intelligent system for detecting intruders,” Proceedings of the symposium on computer security; threats, and counter measures; Rome, Italy, pp. 110–121, 22–23 Nov 1990

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Manthira Moorthy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Moorthy, S.M., Masillamani, M.R. (2014). Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment. In: Sathiakumar, S., Awasthi, L., Masillamani, M., Sridhar, S. (eds) Proceedings of International Conference on Internet Computing and Information Communications. Advances in Intelligent Systems and Computing, vol 216. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1299-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1299-7_6

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1298-0

  • Online ISBN: 978-81-322-1299-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics