Open Access   Article Go Back

An Improved Hybrid Cloud Computing Security Architecture Using Network Based Intrusion Prevention System

P.J. Ebiriene1 , N.D. Nwiabu2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-10 , Page no. 9-14, Oct-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i10.914

Online published on Oct 31, 2019

Copyright © P.J. Ebiriene, N.D. Nwiabu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P.J. Ebiriene, N.D. Nwiabu, “An Improved Hybrid Cloud Computing Security Architecture Using Network Based Intrusion Prevention System,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.9-14, 2019.

MLA Style Citation: P.J. Ebiriene, N.D. Nwiabu "An Improved Hybrid Cloud Computing Security Architecture Using Network Based Intrusion Prevention System." International Journal of Computer Sciences and Engineering 7.10 (2019): 9-14.

APA Style Citation: P.J. Ebiriene, N.D. Nwiabu, (2019). An Improved Hybrid Cloud Computing Security Architecture Using Network Based Intrusion Prevention System. International Journal of Computer Sciences and Engineering, 7(10), 9-14.

BibTex Style Citation:
@article{Ebiriene_2019,
author = {P.J. Ebiriene, N.D. Nwiabu},
title = {An Improved Hybrid Cloud Computing Security Architecture Using Network Based Intrusion Prevention System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2019},
volume = {7},
Issue = {10},
month = {10},
year = {2019},
issn = {2347-2693},
pages = {9-14},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4886},
doi = {https://doi.org/10.26438/ijcse/v7i10.914}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.914}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4886
TI - An Improved Hybrid Cloud Computing Security Architecture Using Network Based Intrusion Prevention System
T2 - International Journal of Computer Sciences and Engineering
AU - P.J. Ebiriene, N.D. Nwiabu
PY - 2019
DA - 2019/10/31
PB - IJCSE, Indore, INDIA
SP - 9-14
IS - 10
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
629 544 downloads 239 downloads
  
  
           

Abstract

Cloud computing is a rapid rising technology and of a great degree acceptable computing prototype round the globe resulting from its merits on prompt deployment, monetary value (on staging up and environment), big storage capacity, likewise worry free privilege to system anytime, anywhere. This work is aimed at defining various attack patterns that affect the accessibility, confidentiality and integrity of resources and services in cloud computing environment. In addition, the research ushers in a network based intrusion prevention system (NIPS) to discover and stop suspecting actions by monitoring configuration of the system, logs files, network traffic changes, and activities of end-users in the cloud computing network using predefined signatures (rules). This rules classified IP address of users to white list for real user and blacklist for attacker. Results shows that block IP addresses found in blacklist were redirected to attackers (intruders) log, detailing the IP addresses, username, date/time and action. The system security is strong; users whose IP addresses, username and password were found in white list could use the system.

Key-Words / Index Term

Cloud Computing, Hybrid Cloud, Network Security, Honey Pot, Network Based, Intrusion, Prevention, Detection

References

[1]. G. Robert. "Privacy in the clouds: risks to privacy and confidentiality from cloud computing." In Proceedings of the World privacy forum, 2012.
[2]. Badger, L., Tim G., Robert P., and Jeff V., "Cloud computing synopsis and recommendations." National Institute of Standards and Technology (NIST), special publication 800 pp.146 2012.
[3]. Stolfo, S. J., S. M. Bellovin, S. Hershkop, A. D. Keromytis, S. Sinclair, S. W. Smith, eds. Insider attack and cyber security: beyond the hacker., Springer Science & Business Media, Vol.39, 2008.
[4]. S. Richard, S. Bahargam, A. Bestavros. "Software-defined ids for securing embedded mobile devices." In 2013 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1-7, 2013.
[5]. N. H. Anh, D. Choi. "Application of data mining to network intrusion detection: classifier selection model." In Asia-Pacific Network Operations and Management Symposium, Springer, Berlin, Heidelberg, pp.399-408., 2008.
[6]. L. Wei., "A genetic algorithm approach to network intrusion detection." SANS Institute, USA Vol.15, pp.209-216, 2004.
[7]. G. R. Hui, M. Zulkernine, P. Abolmaesumi. "A software implementation of a genetic algorithm-based approach to network intrusion detection." In Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/ Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network, IEEE, pp.246-253., 2005.
[8]. Xiang, C., and S. M. Lim. "Design of multiple-level hybrid classifier for intrusion detection system." In 2005 IEEE Workshop on Machine Learning for Signal Processing, pp.117-122., 2005.
[9]. Shacham H. and Waters B. (2008). “Compact proofs of irretrievability,” in Proceedings of Asiacrypt’08 of LNCS, vol.5350, pp.90–107.
[10]. Scarfone, Karen A., and Peter M. Mell. Guide to Intrusion Detection and Prevention Systems (IDPS)| National Institute of Standards and Technology (NIST). No. Special Publication (NIST SP), pp.800-94. 2007.
[11]. Reda M. (2013). "A hybrid network intrusion detection framework based on random forests and weighted k-means." Ain Shams Engineering Journal 4.4, 753-762.
[12]. H. Jin, M. Dong, K. Ota, Minyu F., G. Wang. "NetSecCC: A scalable and fault-tolerant architecture for cloud computing security." Peer-to-Peer Networking and Applications, Vol.9, Issue.1 pp.67-81, 2016.
[13]. Alharkan, T., P. Martin. "Idsaas: Intrusion detection system as a service in public clouds." In Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), IEEE Computer Society, pp.686-687. 2012.
[14]. Mohamed, K. Kifayat, Qi S., W. Hurst. "A system for intrusion prediction in cloud computing." In Proceedings of the International Conference on Internet of things and Cloud Computing, ACM, pp.35, 2016.
[15]. R. Sumant, Mariki M. E., E. Smith. "The management of security in cloud computing." In 2010 Information Security for South Africa, IEEE, pp.1-7, 2010.
[16]. K. Eero, K. Lukka, Arto S., "The constructive approach in management accounting research.", Journal of management accounting research, Vol.5, Issue.1 pp.243-264, 1993.
[17]. L. Liisa, J. Junnonen, S. Kärnä, L. Pekuri. "The constructive research approach: problem solving for complex projects." Designs, Methods and Practices for Research of Project Management. Gower, 2016.
[18]. G. D. Crnkovic, "Constructive research and info-computational knowledge generation." In Model-Based Reasoning in Science and Technology, Springer, Berlin, Heidelberg, pp.359-380, 2010.