This is an outdated version published on 2015-04-08. Read the most recent version.

EICIDS-Elastic and Internal Cloud-based Intrusion Detection System

Authors

  • Josenilson Dias Araújo IFMA
  • Dhileane Andrade Rodrigues UFMA
  • Leonardo Silva Melo UFMA
  • Zair Abdelouahab UFMA
  • Denivaldo Cicero Pavão Lopes UFMA

DOI:

https://doi.org/10.17762/ijcnis.v7i1.1031

Abstract

The elasticity and abundant availability of computational resources are attractive to intruders exploit vulnerabilities of the cloud, thus being able to launch attacks against legitimate users to gain access to private and privileged information. The Intrusion Detection Systems are presented as a possible solution for protection; however, to effectively protect cloud users, it must have the ability to expand, rapidly increased or decreased the amount of sensors, according to the provisioning resources, and isolate the access to infrastructure and system levels. Protection against internal threats should also be planned, as most of the protection systems do not identify them properly. In order to solve these problems, we present the EICIDS - Elastic and Internal Cloud-based Intrusion Detection System, which monitors the internal environment of the cloud, entering sensor data capture in the local network of user´s VMs, thus being able to detect suspicious behavior of users. For this, the EICIDS uses the characteristics of virtual machines (such as fast boot, quick recovery, stop, migrate between different hosts and execution across multiple platforms) in order to monitor and protect the environment of cloud computing, with the growth or reduction of the cloud in order to save resources.

Author Biographies

Zair Abdelouahab, UFMA

DEE

Denivaldo Cicero Pavão Lopes, UFMA

DEE

Downloads

Published

2015-04-08

Versions

How to Cite

Araújo, J. D., Rodrigues, D. A., Melo, L. S., Abdelouahab, Z., & Lopes, D. C. P. (2015). EICIDS-Elastic and Internal Cloud-based Intrusion Detection System. International Journal of Communication Networks and Information Security (IJCNIS), 7(1). https://doi.org/10.17762/ijcnis.v7i1.1031

Issue

Section

Research Articles