A Proactive Approach to Intrusion Detection in Cloud Software as a Service

A Proactive Approach to Intrusion Detection in Cloud Software as a Service

Baldev Singh (Lyallpur Khalsa College, India) and Surya Narayan Panda (Chitkara University Rajpura, India)
DOI: 10.4018/978-1-4666-8510-9.ch013
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Cloud computing environment is very much malicious intrusion prone hence cloud security is very vital. Existing network security mechanisms face new challenges in the cloud such as DDOS attacks, virtual machine intrusion attacks and malicious user activities. This chapter includes brief introduction about cloud computing, concept of virtualization, cloud security, various DDOS attacks, tools to run these attacks & various techniques to detect these attacks, review of threshold methods used for detection of DDOS attacks & abnormal network behavior and proposed dynamic threshold based algorithmic approach. Although various cloud security measures are prevailing to avoid virtual machine attacks and malicious user activities but these are not foolproof. Hence, new security methods are required to increase users' level of trust in clouds. By scrubbing traffic at major Internet points and backbone connection, a defense line is created for mitigation of DDOS attacks. Dynamic threshold algorithm based approach is proposed as a proactive approach to detect DDOS attacks for achieving secure cloud environment.
Chapter Preview
Top

Cloud Security

Security is one of important issues prevailing in the cloud environment. Cyber attacks against large internet ventures keep on rising and they directly affect the cloud users. Cloud customers (organizations) are questioning the security of moving their computational assets toward the cloud. These improper operations are generally conducted for a number of reasons. Financial gain can also be a motivation to steal valuable information from sensitive organizations such as those in the banking sector. Cyber surveillance operations typically conducted to gather information about financial or industrial adversaries are some of the new trends over the internet. Existing network security mechanisms face new challenges in the cloud such as DDOS attacks (Bhuyan, Kashyap, Bhattacharyya & Kalita, 2013), virtual machine intrusion attacks and malicious user activities. Hence, new security methods (Tao, Hui, Feng & Cheng, 2012), (Subashini & Kavitha,2011) are required to increase users' level of trust in clouds. Presently, cloud service providers implement data encryption for the data centers, virtual firewalls and access control lists.

Complete Chapter List

Search this Book:
Reset