Abstract
Security requires user authentication with password digital certificates and confidentiality for transmission of data in a distributed system. The Intrusion Detection System (IDS) detect intrusions by means of knowledge and behavior analysis. In this paper, we introduce concept called cloud computing to increase data efficiency and satisfies user request. We also include grid computing to make cloud computing more efficient, reliable, and increase the performance of the systems that are accessing server. This is because of more user logins at the same time and the server is not able to provide equal performance to all other system. We can achieve performance by getting performance from the system that are connected to server and providing it to system that accessing the server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chaboya, D.J., Raines, R.A., Baldwin, R.O., Mullins, B.E.: Network intrusion detection: automated and manual method prone to attack and evaton. IEEE Secur. Priv. 4, 36–43 (2006)
Overill, R.E.: Intrusion detection systems: threats, taxonomy, tuning. J. Finan. Crim. 6, 49–51 (1998)
Smarr, L., Catlett, C.E.: Meta computing. Commun. ACM 35, 44–52 (1992)
Schulter, A.: Intrusion detection for computational grids. Proceedings of 2nd International 2nd Conference on new technologies, mobility, and security, Tangier - Morocco, pp. 1–5. IEEE Press, (2008)
Bolosky, W.J., Douceur, J.R., Ely, D., Theimer, M.: Feasibility of a serverless distributed file 284 system deployed on an existing set of desktop PCs, SIGMETRICS, ACM, Performance Evaluation 285 Review, 34–43 (2000). http://dl.acm.org/citation.cfm?doid=339331.339345
Idris, N.B., Shanmugam, B.: Indicon. Annual IEEE, pp. 52–55, 2005. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1590122&punumber%3D10601
Cuppens, F., Gombault, S.: Thierry Sans: selecting appropriate counter-measures in an intrusion detection framework. In: Proceedings of the 17th IEEE workshop on computer security foundations, pp. 78–80, 2004. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1310733&sortType%3Dasc_p_Sequence%26filter%3DAND%28p_IS_Number%3A29101%29
Zhang, G.Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. ACM J. Wirel. Netw. 9, 545–546 (2003)
Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 222–232 (1987)
Li, T., Song, M., Alam, M.: Compromized sensor node detection: a quantitative approach. In: Proceedings of the IEEE international conference on distributed computing systems, pp. 352–357, 2008.
Shapiro, M.: Structure and encapsulation in distributed systems: the proxy principle, Proc. 6th Int. Conf. on Distributed Computing Systems(ICDCS), Cambridge MA (USA), pp. 198–204, 1986
Lunt, Teresa F.: “IDES: An intelligent system for detecting intruders,” Proceedings of the symposium on computer security; threats, and counter measures; Rome, Italy, pp. 110–121, 22–23 Nov 1990
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Moorthy, S.M., Masillamani, M.R. (2014). Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment. In: Sathiakumar, S., Awasthi, L., Masillamani, M., Sridhar, S. (eds) Proceedings of International Conference on Internet Computing and Information Communications. Advances in Intelligent Systems and Computing, vol 216. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1299-7_6
Download citation
DOI: https://doi.org/10.1007/978-81-322-1299-7_6
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1298-0
Online ISBN: 978-81-322-1299-7
eBook Packages: EngineeringEngineering (R0)