Sunteți pe pagina 1din 1

Topics: Distribute NIDS on Cloud Security

Lastono Risman Hidayat (23513062)


lastono@s.itb.ac.id
Introduction
Internet that evolving today start to break into field of the cloud computing, where all
available resource such as storage, processing and applications are on the network
connectivity. Cloud computing actually has 3 services:
1. Software as a service (SaaS)
2. Platform as a service (PaaS)
3. Infrastructure as a service (IaaS)
Cloud storage is one of the IaaS that provide storage. Cloud has its own challenges. Such
as the security of data distribution in cloud storage. Security issues of cloud is how to
protect the data and the data existing infrastructure in cloud computing.
Problem Statement
Nowdays, cloud storage and cloud computing become trend on every business. But many
cloud service providers just use a firewall to handle the network attack, but the firewall
is a precaution that cant provide attack warning such as DoS, DDoS, or Brute Force, the
cloud still have weak protection on user data or system. Network Intrusion Detection
System (NIDS) is one of the Intrusion Detection System which is placed on the network
and serves to monitor and analyze the existing attacks, and this method can warn the
system administrator, so the threats can be handled quickly before it become worse.
Solution
This study is proposed to use of the Distribute NIDS Cloud Security Intrusion Detection
System that works on the network to protect service Infrastructure as a Service (IaaS) for
cloud computing which is implemented into a distributed Cloud Computing Network. By
using NIDS, all existing traffic will be mirrored to the NIDS so that all traffic can be
monitored by NIDS, so it will look suspicious traffic and to provide a report to the
administrator of the existing network. NIDS will be implemented on each point of cloud.
References
[1] P. Srinivasulu, "Classifying the Network Intrusion Attacks using Data Mining Classification
Methods and their Performance Comparison," International Journal of Computer Science and
Network Security, vol. 9, no. 6, 2009.
[2] N. Devarakonda, "Outliers Detection as Network Intrusion Detection System Using Multi
Layered Framework," in Advances in Computer Science and Information Technology: First
International Conference on Computer Science and Information Technology, 2011.
[3] M. P. Brennan, "sans," SANS Institute, 2002. [Online]. Available: http://www.sans.org/readingroom/whitepapers/detection/snort-distributed-intrusion-detection-system-352. [Accessed 15
september 2014].
[4] P. Mell, "NIST," 2011. [Online]. Available: http://csrc.nist.gov/publications/drafts/800145/Draft-SP-800-145 cloud-denition.pdf. [Accessed 16 september 2014].

S-ar putea să vă placă și