The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing 2011
DOI: 10.4108/icst.collaboratecom.2011.247158
|View full text |Cite
|
Sign up to set email alerts
|

DCDIDP: A Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention Framework for Cloud Computing Environments

Abstract: Abstract-With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…3. The extent of collaborative environments like cloud computing (Bhushan & Gupta, 2018;Joshi et al, 2012;Mishra et al, 2021;Xiao & Xiao, 2012; and IoT (Chui et al, 2019;Cvitić et al, 2021;Evans, 2011;Kolias et al, 2017;Marr, 2021;Munshi et al, 2020;Sambandam et al, 2018;Zargar et al, 2011) present more and more new avenues for attackers to exploit, like the IoT botnets that include dedicated systems as well as mobile devices, simple home appliances, and IoV-based automotive, etc. DDoS-for-hire services have also increased due to such simple targets since these devices lack significantly in terms of security.…”
Section: Open Challenges and Future Research Directionsmentioning
confidence: 99%
“…3. The extent of collaborative environments like cloud computing (Bhushan & Gupta, 2018;Joshi et al, 2012;Mishra et al, 2021;Xiao & Xiao, 2012; and IoT (Chui et al, 2019;Cvitić et al, 2021;Evans, 2011;Kolias et al, 2017;Marr, 2021;Munshi et al, 2020;Sambandam et al, 2018;Zargar et al, 2011) present more and more new avenues for attackers to exploit, like the IoT botnets that include dedicated systems as well as mobile devices, simple home appliances, and IoV-based automotive, etc. DDoS-for-hire services have also increased due to such simple targets since these devices lack significantly in terms of security.…”
Section: Open Challenges and Future Research Directionsmentioning
confidence: 99%
“…V. RELATED WORK Some basic concepts about remote detection, context sharing, and agent-based cyber-security frameworks were already explored in the past [6]- [8]. In many cases, legacy security appliances are used and their output is correlated; the duplication at the local and global level introduces redundancy and also communication overhead.…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…The complete scenario is revealed when relationships are created from different network traces. Several works like [16,14] using different approaches have exposed intrusion detection systems (IDS) that are collaborative or distributed as a solution to detect possible attacks (such as, to detect a distributed denial of service (DDoS)). Collaborative or distributed IDSs can observe that different hosts located at different networks are sending network packets to the final common target.…”
Section: Distributed Network Monitoring Approachmentioning
confidence: 99%