Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment

作者: S. Manthira Moorthy , M. Roberts Masillamani

DOI: 10.1007/978-81-322-1299-7_6

关键词: Grid computingCloud computingData securityGridPublic key certificateOperating systemPasswordSoftware as a serviceComputer scienceIntrusion detection system

摘要: Security requires user authentication with password digital certificates and confidentiality for transmission of data in a distributed system. The Intrusion Detection System (IDS) detect intrusions by means knowledge behavior analysis. In this paper, we introduce concept called cloud computing to increase efficiency satisfies request. We also include grid make more efficient, reliable, the performance systems that are accessing server. This is because logins at same time server not able provide equal all other can achieve getting from system connected providing it

参考文章(10)
Yongguang Zhang, Wenke Lee, Yi-An Huang, Intrusion detection techniques for mobile wireless networks Wireless Networks. ,vol. 9, pp. 545- 556 ,(2003) , 10.1023/A:1024600519144
Marc Shapiro, Structure and Encapsulation in Distributed Systems: the Proxy Principle international conference on distributed computing systems. pp. 198- 204 ,(1986)
F. Cuppens, T. Sans, S. Gombault, Selecting appropriate counter-measures in an intrusion detection framework ieee computer security foundations symposium. pp. 78- 87 ,(2004) , 10.1109/CSFW.2004.18
Richard E. Overill, Intrusion Detection Systems: Threats, Taxonomy, Tuning Journal of Financial Crime. ,vol. 6, pp. 49- 51 ,(1998) , 10.1108/EB025861
William J. Bolosky, John R. Douceur, David Ely, Marvin Theimer, Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs measurement and modeling of computer systems. ,vol. 28, pp. 34- 43 ,(2000) , 10.1145/339331.339345
David Chaboya, Richard Raines, Rusty Baldwin, Barry Mullins, Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion ieee symposium on security and privacy. ,vol. 4, pp. 36- 43 ,(2006) , 10.1109/MSP.2006.159
D.E. Denning, An Intrusion-Detection Model IEEE Transactions on Software Engineering. ,vol. 13, pp. 222- 232 ,(1987) , 10.1109/TSE.1987.232894
Alexandre Schulter, Kleber Vieira, Carlos Westphall, Carla Westphall, Sekkaki Abderrahim, None, Intrusion Detection for Computational Grids new technologies, mobility and security. pp. 1- 5 ,(2008) , 10.1109/NTMS.2008.ECP.54
L. Smarr, C. E. Catlett, Metacomputing : Siggraph'92 Showcase Communications of The ACM. ,vol. 35, pp. 44- 52 ,(1992)
Xiuzhen Cheng, Minghui Xu, Runyu Pan, Dongxiao Yu, Chenxu Wang, Xue Xiao, Weifeng Lyu, Metacomputing Communications of the ACM. ,vol. 35, pp. 44- 52 ,(1992) , 10.1145/129888.129890