2012 International Conference on Computing, Communication and Applications 2012
DOI: 10.1109/iccca.2012.6179141
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection system for grid computing using SNORT

Abstract: Because of distributed nature, grid computing environments are easy targets for intruders looking for possible vulnerabilities to exploit [1]. By impersonating legitimate users, the intruders can use a service's abundant resources maliciously. To combat attackers, intrusiondetection systems (IDSs) can offer additional security measures for these environments by investigating configurations, logs, network traffic, and user actions to identify typical attack behavior. However, IDS must be distributed to work in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(21 citation statements)
references
References 9 publications
0
21
0
Order By: Relevance
“…Kumar, Hanumanthappa and Kumar [14] have discussed the main issues in Snort IDS when integrating with the Cloud/ Grid computing. In order to overcome these issues in the legacy Snort IDS, Kumar, Hanumanthappa and Kumar [14] introduced a new model of intrusion detection system for grid computing using Snort.…”
Section: A) Detection Through Legacy Solutionsmentioning
confidence: 99%
See 4 more Smart Citations
“…Kumar, Hanumanthappa and Kumar [14] have discussed the main issues in Snort IDS when integrating with the Cloud/ Grid computing. In order to overcome these issues in the legacy Snort IDS, Kumar, Hanumanthappa and Kumar [14] introduced a new model of intrusion detection system for grid computing using Snort.…”
Section: A) Detection Through Legacy Solutionsmentioning
confidence: 99%
“…As mentioned by Kumar, Hanumanthappa and Kumar [14], those NIDSs must have scalability and distributed nature in order to be used with the cloud environment. But those three NIDSs do not focus the scalable and distributed nature of their architecture.…”
Section: A) Detection Through Legacy Solutionsmentioning
confidence: 99%
See 3 more Smart Citations