IDS in Cloud Environment
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2014 by IJCTT Journal|
|Year of Publication : 2014|
|Authors : Shikha Pandit , Pooja|
|DOI : 10.14445/22312803/IJCTT-V11P148|
Shikha Pandit , Pooja."IDS in Cloud Environment". International Journal of Computer Trends and Technology (IJCTT) V11(5):228-230, May 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
In today’s time, providing security to the network based systems is very important to perform all operations in reliable manner. With graduate increase in number of attacks on the network based systems, researcher’s interest have increased in IDS(Intrusion Detection System).This paper provides information about IDS and its services and various problems existing in cloud systems. To execute this setup, we are here using the SNORT IDS software on virtual machines.
 Anderson, James P., “Computer Security Threat Monitoring and Surveillance”,Fort Washington, Pa., 1980.
 D. E. Denning, "An intrusion-detection model." IEEE Transactions on Software Engineering, Vol. SE-13(No. 2):222-232, Feb. 1987.
 Heberlein, L. etal. "A Network Security Monitor." Proceedings of the IEEE Computer Society Symposium, Research in Security and Privacy, May 1990, pp. 296-303.
 Paul Innella Tetrad, “The Evolution of Intrusion Detection Systems”, Digital Integrity,LLC on November 16, 2001.
 Harley Kozushko, “Intrusion Detection: Host-Based and Network-Based Intrusion Detection Systems”, on September 11, 2003.
 M. Bilodeau and D. Brenner, Theory of multivariate statistics. Springer - Verlag : New York, 1999.Electronic edition at ebrary, Inc.
 M. Botha and R. von Solms, “Utilising fuzzy logic and trend analysis for effective intrusion detection,”Computers& Security, vol. 22, no. 5, pp. 423–434,2003.
 Susan M. Bridges and M. Vaughn Rayford, “Fuzzy data mining and genetic algorithms applied to intrusion detection,” in Proceedings of the Twenty-third National Information Systems Security Conference. National Institute of Standards and Technology, Oct.2000.
 D. Bulatovic and D. Velasevic, “A distributed intrusion detection system based on bayesian alarm networks,” Lecture Notes in Computer Science (Secure Networking CQRE (Secure) 1999), vol. 1740, pp. 219–228, 1999.
 NETSEC-Network Security Software Co. “Specter,”. http://www.specter.com/.
 NFR Co. “Website of nfr co.,”. http://www.nfr.net/.
 S. B. Cho, “Incorporating soft computing techniques into a probabilistic intrusion detection system,” IEEE TRANSACTIONS ON SYSTEMS, MAN,AND CYBERNETICSPART C: APPLICATIONS AND REVIEWS, vol. 32, pp. 154–160, May 2002.
IDS, Detection approach, WINSCP, PHP, IDRS, VMWare, Network Security