Full Paper View Go Back

An Integrated approach for effective Intrusion Detection with Elasticsearch

Piyush Pareta1 , Manish Rai2 , Mohit Gangwar3

Section:Research Paper, Product Type: Isroset-Journal
Vol.6 , Issue.3 , pp.13-17, Jun-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i3.1317


Online published on Jun 30, 2018


Copyright © Piyush Pareta, Manish Rai, Mohit Gangwar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Piyush Pareta, Manish Rai, Mohit Gangwar, “An Integrated approach for effective Intrusion Detection with Elasticsearch,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.13-17, 2018.

MLA Style Citation: Piyush Pareta, Manish Rai, Mohit Gangwar "An Integrated approach for effective Intrusion Detection with Elasticsearch." International Journal of Scientific Research in Computer Science and Engineering 6.3 (2018): 13-17.

APA Style Citation: Piyush Pareta, Manish Rai, Mohit Gangwar, (2018). An Integrated approach for effective Intrusion Detection with Elasticsearch. International Journal of Scientific Research in Computer Science and Engineering, 6(3), 13-17.

BibTex Style Citation:
@article{Pareta_2018,
author = {Piyush Pareta, Manish Rai, Mohit Gangwar},
title = {An Integrated approach for effective Intrusion Detection with Elasticsearch},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {3},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {13-17},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=641},
doi = {https://doi.org/10.26438/ijcse/v6i3.1317}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.1317}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=641
TI - An Integrated approach for effective Intrusion Detection with Elasticsearch
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Piyush Pareta, Manish Rai, Mohit Gangwar
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 13-17
IS - 3
VL - 6
SN - 2347-2693
ER -

818 Views    397 Downloads    211 Downloads
  
  

Abstract :
Cloud computing environments are easy targets for intruders and pose new risks and threats to an organization because of their service and operational models, the underlying technologies, and their distributed nature that relies on the network for its working. However, IDSs are among the efficient security mechanisms that can handle most of the threats of cloud computing. In spite this, several deficiencies of current IDSs technologies and solutions hinder their adoption in a cloud. The proposed work focuses on developing improved IDS that provides an integrated approach of both techniques i.e. anomaly based as well as knowledge based whether implement on network or host based IDS for cloud computing to detect masquerade, host, and network attacks and provides efficient deployments to detect DDoS attacks. The work comprises of integration of two powerful open source tool Suricata and Snort together with the proposed DDoS detection rule make the working of IDS more effective and high alarm rate generating Hybrid IDS.

Key-Words / Index Term :
Cloud Security, Distributed Denial of Service Attack (DDoS), Intrusion Detection System (IDS), Suricata, Snort, Hybrid IDS.

References :
[1]. http://www.nist.gov/itl/cloud/upload/cloud-defv15.pdf
[2]. M. Madhavi, “An Approach for Intrusion Detection System in Cloud Computing”, Elsevier, (2012).
[3]. U. Oktay, O.K. Sahingoz et al, “Attack Types and Intrusion Detection System in Cloud Computing”, Elsevier, (2013)
[4]. Jabej J, Dr.B. Muthu Kumar, “Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach”, Science Direct, 2015.
[5]. Nandita Sengupta, Ramya Chinnasamy “Contriving Hybrid DESCAST Algorithm for Cloud Security”, Elsevier, 2015.
[6]. Anitha H M, P.Jayarekha “Security Challenges of Virtualization in Cloud Environment”, IJCSE, 2018.
[7]. Praveen Kumar Rajendran, B. Muthukumar, G.Nagarajan, “Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach”, Elsevier, 2015
[8]. Hassen Mohammed Alsafi , Wafaa Mustafa Abduallah, “IDPS: An Integrated Intrusion Handling Model for Cloud Computing Environment”, Elsevier, 2014
[9]. Amirreza Zarrabi, Alireza, “Internet Intrusion Detection System Service in a Cloud”, 2012
[10]. Ahmed Patel, Mona Taghavi, et al, “An intrusion detection and prevention system in cloud computing: A systematic review”, Elsevier , 2012
[11]. Seyed Mojtaba Hosseini Bamakan, et al., “New Intrusion Detection Approach using PSO based Multiple Criteria Linear Programming”, Elsevier, 2015
[12]. Cong Wang, Qian Wang, and Kui Ren, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, IEEE INFOCOM 2010.
[13]. Dimitrios Zissis, Dimitrios Lekkas “Addressing cloud computing security issues” Future Generation Computer Systems, Elsevier, (2012).
[14]. Kshetri,N. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy (2012)
[15]. http://www.nist.gov/itl/cloud/upload/cloud-defv15.pdf
[16]. K. Salah, J. M. Alcaraz-Calero,S. Zeadally, S. Almulla and M. Alzaabi “Using Cloud Computing to Implement a Security Overlay Network”, IEEE, Security and Privacy, (2011).
[17]. N. Cao, Z. Yang, C. Wang, K. Ren, W. Lou, "Privacy-preserving query over encrypted graph-structured data in cloud computing", in: IEEE International Conference on Distributed ComputingSystems, ICDCS’11, (2011), pp. 393–402
[18]. S. Marston et al. / Decision Support Systems 51 (2011) 176–189
[19]. Cong Wang, Qian Wang, and Kui Ren, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing", IEEE INFOCOM (2010).
[20]. Shuai Zhang and Shufen Zhang “Cloud Computing Research and Development Trend”, IEEE, Second International Conference on Future Networks, (2010)
[21]. J. Yao, S. Chen, S. Nepal, D. Levy, J. Zic, "Truststore: making Amazon S3 trustworthy with services composition", in: Proceedings of the ” 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, CCGRID’08, Melbourne, Australia, (2010), pp. 600–605
[22]. Goscinski, M. Brock / Future Generation Computer Systems 26 (2010) 947_970
[23]. Groce, J. Katz, ”A new framework for efficient password-based authenticated key exchange”, in: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10, Chicago, USA, (2010), pp. 516–525
[24]. R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, "Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems" 25 (2009) 599–616.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation