{"title":"基于云理论的分布式入侵检测模型","authors":"Han Li, Qiuxin Wu","doi":"10.1109/CCIS.2012.6664443","DOIUrl":null,"url":null,"abstract":"Cloud computing is defined as the storage, management, processing, and accessing information and other data stored in a specific server. With the advent of internet, intrusion attacks have gained sophistication over the time. Distributed attacks could not be detected by the present available intrusion detection system. In this case, we propose a distributed intrusion detection model based on Cloud theory. Our model is composed by Intrusion Detection Agent subsystem and Data Aggregation subsystem. Intrusion Detection Agent subsystem has three parts: data collection module, Cloud decision-making module and communication module. An intrusion detection algorithm based on Cloud theory was proposed to detect intrusion behavior and improve the detection ability to complicated intrusion. Followed by our model, we introduced a strategy to defend DDoS attack using the elastic properties of cloud platform.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"128 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A distributed intrusion detection model based on cloud theory\",\"authors\":\"Han Li, Qiuxin Wu\",\"doi\":\"10.1109/CCIS.2012.6664443\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is defined as the storage, management, processing, and accessing information and other data stored in a specific server. With the advent of internet, intrusion attacks have gained sophistication over the time. Distributed attacks could not be detected by the present available intrusion detection system. In this case, we propose a distributed intrusion detection model based on Cloud theory. Our model is composed by Intrusion Detection Agent subsystem and Data Aggregation subsystem. Intrusion Detection Agent subsystem has three parts: data collection module, Cloud decision-making module and communication module. An intrusion detection algorithm based on Cloud theory was proposed to detect intrusion behavior and improve the detection ability to complicated intrusion. Followed by our model, we introduced a strategy to defend DDoS attack using the elastic properties of cloud platform.\",\"PeriodicalId\":392558,\"journal\":{\"name\":\"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems\",\"volume\":\"128 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCIS.2012.6664443\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCIS.2012.6664443","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A distributed intrusion detection model based on cloud theory
Cloud computing is defined as the storage, management, processing, and accessing information and other data stored in a specific server. With the advent of internet, intrusion attacks have gained sophistication over the time. Distributed attacks could not be detected by the present available intrusion detection system. In this case, we propose a distributed intrusion detection model based on Cloud theory. Our model is composed by Intrusion Detection Agent subsystem and Data Aggregation subsystem. Intrusion Detection Agent subsystem has three parts: data collection module, Cloud decision-making module and communication module. An intrusion detection algorithm based on Cloud theory was proposed to detect intrusion behavior and improve the detection ability to complicated intrusion. Followed by our model, we introduced a strategy to defend DDoS attack using the elastic properties of cloud platform.