Skip to main content

Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud-Based Environment

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

Abstract

Cloud computing has gained an extreme importance nowadays. Every organization is getting attracted toward the Cloud computing due to its attractive features like cost saving, adaptability, etc. Although it offers the attractive features but still Cloud threats need great consideration. The insider threat is critically challenging in the Cloud-based environments. In order to mitigate from insider attacks in Clouds, the use of Intrusion detection system (IDS) is quite challenging. Every type of IDS has different methods of attack detection. So, single IDS cannot guarantee the protection from all types of attacks. Thus, in this paper, we have studied the various types of IDS and their features which made them either suitable or unsuitable for cloud computing. Also on the basis of review, required features for the Cloud-based IDS are identified.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. https://en.wikipedia.org/wiki/Cloud_computing

  2. Forrester-2012, Cloud survey. http://www.bmc.com/industryanalysts/reports/forrester-2012-cloud-survey.html (accessed May 2012)

  3. Yusop ZM, Abawajy JH (2014) Analysis of insiders attack mitigation strategies. Procedia Soc Behav Sci 129:581–591

    Article  Google Scholar 

  4. Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1):69–73. https://doi.org/10.1109/MIC.2012.14

    Article  Google Scholar 

  5. Patel A, Taghavi M, Bakhtiyari K, Júnior JC (2013) An intrusion detection and prevention system in cloud computing: a systematic review. J Netw Comput Appl 36(1):25–41

    Article  Google Scholar 

  6. Kholidy HA, Baiardi F (2012) CIDS: a framework for intrusion detection in cloud, systems. In: 2012 ninth international conference on information technology—new Generations, 978-0-7695-4654-4/12 $26.00 © 2012 IEEE

    Google Scholar 

  7. Khorshed MT, Ali ABMS, Wasimi SA (2011) Monitoring insiders activities in cloud computing using rule based learning. In: IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom-2011), 16–18 Nov 2011

    Google Scholar 

  8. Gul I, Hussain M (2011) Distributed cloud intrusion detection model. Int J Adv Sci Technol 34

    Google Scholar 

  9. Schmidt M, Baumgartner L, Graubner P, Bock D, Freisleben B (2011) Malware detection and kernel rootkit prevention in cloud computing environments. In: 19th Euromicro international conference on parallel, distributed and network-based processing (PDP-2011), pp 603–610, 9–11 Feb 2011

    Google Scholar 

  10. Nkosi L, Tarwireyi P, Adigun M (2013) Insider threat detection model for the cloud. 978-1-4799-0808-0/13/$31.00 ©2013 IEEE

    Google Scholar 

  11. Yang S-F, Chen W-Y, Wang Y-T (2011) ICAS: an inter-VM IDS log cloud analysis system. In: IEEE international conference on cloud computing and intelligence systems (CCIS-2011), 15–17 Sept 2011

    Google Scholar 

  12. Ficco M, Tasquier L, Aversa R (2013) Intrusion detection in cloud computing. In: 18th international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC-2013), pp 276–283, 28–30 Oct 2013

    Google Scholar 

  13. Nguyen M-D, Chau N-T, Jung S, Jung S (2014) A demonstration of malicious insider attacks inside cloud IaaS vendor. Int J Inf Educ Technol 4(6). https://doi.org/10.7763/ijiet.2014.v4.455

    Article  Google Scholar 

  14. Kandias M, Virvilis N, Gritzalis D (2013) The insider threat in cloud computing. In: Critical information infrastructure security. Lecture notes in computer science, vol 6983. Springer, Berlin, pp 93–103

    Google Scholar 

  15. Mehmood Y, Habiba U, Muhammad AS, Masood R (2013) Intrusion detection system in cloud computing: challenges and opportunities. In: 2nd national conference on information assurance (NCIA), pp 59–66, 978-1-4799-1288-9/13©2013 IEEE

    Google Scholar 

  16. Gupta S, Kumar P, Sardana A, Abraham A, A fingerprinting system calls approach for intrusion detection in cloud environment. In: 4th international conference computational aspects of social networks (CASoN-2012), published by IEEE, pp 309–314

    Google Scholar 

  17. Martinez-Moyano IJ, Rich E, Conrad S, Andersen DF, Stewart TR (2008) A behavioral theory of insider threat risks: a system dynamics approach. ACM Trans Modeling Comput Simul 18(2):7.1–7.27

    Google Scholar 

  18. Dileep Kumar G, Morarjee K (2014) Insider data theft detection using decoy and user behavior profile. Int J Res Comput Appl Robot 2(2):51–55. ISSN: 2320-7345. www.ijrcar.in

  19. Young WT, Goldberg HG, Memory A, Sartain JF, Senator TE (2013) Use of domain knowledge to detect insider threats in computer activities. IEEE security and privacy workshops

    Google Scholar 

  20. Wongthai W, Rocha F, Van Moorsel A (2013) Logging solutions to mitigate risks associated with threats in infrastructure as a service cloud. In: International conference on cloud computing and big data, pp 163–170

    Google Scholar 

  21. Claycomb WR, Nicoll A (2012) Insider threats to cloud computing directions for new research challenges. In: Proceedings of the 2012 IEEE 36th annual computer software and applications conference, pp 387–394. IEEE Computer Society, Washington, DC, USA ©2012

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priya Oberoi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Oberoi, P., Mittal, S. (2018). Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud-Based Environment. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics