메뉴 건너뛰기




Volumn 36, Issue 1, 2013, Pages 25-41

An intrusion detection and prevention system in cloud computing: A systematic review

Author keywords

Alarm correlation; Cloud computing; Intrusion detection and prevention; System requirements; Taxonomy

Indexed keywords

ALARM CORRELATION; ALARM MANAGEMENT; AUTONOMIC COMPUTING; COMPUTING ENVIRONMENTS; COMPUTING SYSTEM; CYBER-ATTACKS; FUZZY THEORY; INTRUSION DETECTION AND PREVENTION; INTRUSION DETECTION AND PREVENTION SYSTEMS; OPEN STRUCTURE; SELF MANAGEMENT; SYSTEM REQUIREMENTS; SYSTEMATIC REVIEW;

EID: 84870667876     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2012.08.007     Document Type: Review
Times cited : (357)

References (91)
  • 1
    • 74849129720 scopus 로고    scopus 로고
    • New data mining technique to enhance IDS alarms quality
    • S Al-Mamory, and H Zhang New data mining technique to enhance IDS alarms quality Journal in Computer Virology 6 2010 43 55
    • (2010) Journal in Computer Virology , vol.6 , pp. 43-55
    • Al-Mamory, S.1    Zhang, H.2
  • 2
    • 70449353683 scopus 로고    scopus 로고
    • Identifying false alarm for network intrusion detection system using data mining and decision tree
    • NB Anuar, H Sallehudin, A Gan, and O Zakari Identifying false alarm for network intrusion detection system using data mining and decision tree Malaysian Journal of Computer Science 21 2008 101 115
    • (2008) Malaysian Journal of Computer Science , vol.21 , pp. 101-115
    • Anuar, N.B.1    Sallehudin, H.2    Gan, A.3    Zakari, O.4
  • 8
    • 64549160247 scopus 로고    scopus 로고
    • Next-generation misuse and anomaly prevention system
    • PG Bringas, and YK Penya Next-generation misuse and anomaly prevention system Enterprise Information Systems 19 2009 117 129
    • (2009) Enterprise Information Systems , vol.19 , pp. 117-129
    • Bringas, P.G.1    Penya, Y.K.2
  • 15
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • K.-KR Choo The cyber threat landscape: challenges and future research directions Computers & Security 30 2011 719 731
    • (2011) Computers & Security , vol.30 , pp. 719-731
    • Choo, K.-K.1
  • 16
    • 84860237427 scopus 로고    scopus 로고
    • Host-based intrusion detection systems adapted from agent-based artificial immune systems
    • O Chung-Ming Host-based intrusion detection systems adapted from agent-based artificial immune systems Neurocomputing 2012
    • (2012) Neurocomputing
    • Chung-Ming, O.1
  • 17
    • 79952065844 scopus 로고    scopus 로고
    • Cloud-Security-Alliance
    • Cloud-Security-Alliance. (2010). Top Threats to Cloud Computing V1.0. Available: 〈https://cloudsecurityalliance.org/topthreats/csathreats.v1.0. pdf〉
    • (2010) Top Threats to Cloud Computing V1.0.
  • 18
    • 77949590054 scopus 로고    scopus 로고
    • Distributed intrusion detection in clouds using mobile agents
    • Dastjerdi AV, KA Bakar, S.G.H. Tabatabaei Sliema
    • Dastjerdi AV, KA Bakar, and SGH Tabatabaei, Distributed intrusion detection in clouds using mobile agents, in Third International Conference on Advanced Engineering Computing and Applications in Sciences, Sliema. pp. 175-180, 2009.
    • (2009) Third International Conference on Advanced Engineering Computing and Applications in Sciences , pp. 175-180
  • 20
    • 79960556588 scopus 로고    scopus 로고
    • Alert correlation in collaborative intelligent intrusion detection systems - A survey
    • HT Elshoush, and IM Osman Alert correlation in collaborative intelligent intrusion detection systems - a survey Applied Soft Computing 11 2011 4349 4365
    • (2011) Applied Soft Computing , vol.11 , pp. 4349-4365
    • Elshoush, H.T.1    Osman, I.M.2
  • 22
    • 62949225623 scopus 로고    scopus 로고
    • Cloud computing and grid computing 360-degree compared
    • GCE '08 Austin, TX 2008
    • Foster I, Y Zhao, I Raicu, and S Lu, Cloud computing and grid computing 360-degree compared, in Grid Computing Environments Workshop, 2008. GCE '08 Austin, TX. pp. 1-10, 2008
    • (2008) Grid Computing Environments Workshop , pp. 1-10
    • Foster, I.1    Zhao, Y.2    Raicu, I.3    Lu, S.4
  • 30
    • 68949196337 scopus 로고    scopus 로고
    • A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
    • XD Hoang, J Hu, and P Bertok A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference Journal of Network and Computer Applications 32 2009 1219 1228
    • (2009) Journal of Network and Computer Applications , vol.32 , pp. 1219-1228
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 32
    • 84870698695 scopus 로고    scopus 로고
    • Database intrusion prevention cum detection system with appropriate response
    • A Jaiswal, and S Jain Database intrusion prevention cum detection system with appropriate response International Journal of Information Technology 2 2010 651 656
    • (2010) International Journal of Information Technology , vol.2 , pp. 651-656
    • Jaiswal, A.1    Jain, S.2
  • 36
    • 84870675643 scopus 로고    scopus 로고
    • Alarm management for intrusion detection systems - Prioritizing and presenting alarms from intrusion detection systems
    • master of science thesis, University of Gothenburg
    • Klüft S, Alarm management for intrusion detection systems - prioritizing and presenting alarms from intrusion detection systems, Master, Computer Science Programme, master of science thesis, University of Gothenburg, 〈http://hdl.handle.net/2077/28856〉, 2012.
    • (2012) Master, Computer Science Programme
    • Klüft, S.1
  • 39
    • 84858158707 scopus 로고    scopus 로고
    • A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
    • MT Khorshed, ABMS Ali, and SA Wasimi A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing Future Generation Computer Systems 28 2012 833 851
    • (2012) Future Generation Computer Systems , vol.28 , pp. 833-851
    • Khorshed, M.T.1    Ali, A.2    Wasimi, S.A.3
  • 40
    • 84870688838 scopus 로고    scopus 로고
    • System intrusion detection and prevention
    • JM Kizza, Springer London
    • JM Kizza System intrusion detection and prevention JM Kizza, A Guide to Computer Network Security 2009 Springer London 273 298
    • (2009) A Guide to Computer Network Security , pp. 273-298
    • Kizza, J.M.1
  • 44
    • 33749575854 scopus 로고    scopus 로고
    • An immunity-based dynamic multilayer intrusion detection system
    • D-S Huang, K Li, G Irwin, Springer Berlin Heidelberg
    • G Liang, T Li, J Ni, Y. Jiang, J Yang, and X Gong An immunity-based dynamic multilayer intrusion detection system D-S Huang, K Li, G Irwin, Computational Intelligence and Bioinformatics 4115 2006 Springer Berlin Heidelberg 641 650
    • (2006) Computational Intelligence and Bioinformatics , vol.4115 , pp. 641-650
    • Liang, G.1    Li, T.2    Ni, J.3    Jiang, Y.4    Yang, J.5    Gong, X.6
  • 45
    • 84958970105 scopus 로고    scopus 로고
    • The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
    • A Wespi, G Vigna, L Deri, Springer Berlin/ Heidelberg
    • R. Lippmann, S Webster, and D Stetson The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection A Wespi, G Vigna, L Deri, Recent Advances in Intrusion Detection 2516 2002 Springer Berlin/ Heidelberg 307 326
    • (2002) Recent Advances in Intrusion Detection , vol.2516 , pp. 307-326
    • Lippmann, R.1    Webster, S.2    Stetson, D.3
  • 47
    • 81355154787 scopus 로고    scopus 로고
    • An ontology-based intrusion alerts correlation system
    • W Li, and S Tian An ontology-based intrusion alerts correlation system Expert Systems with Applications 37 2010 7138 7146
    • (2010) Expert Systems with Applications , vol.37 , pp. 7138-7146
    • Li, W.1    Tian, S.2
  • 48
    • 66449085932 scopus 로고    scopus 로고
    • Reducing false positives in anomaly detectors through fuzzy alert aggregation
    • F Maggi, M Matteucci, and S Zanero Reducing false positives in anomaly detectors through fuzzy alert aggregation Information Fusion 10 2009 300 311
    • (2009) Information Fusion , vol.10 , pp. 300-311
    • Maggi, F.1    Matteucci, M.2    Zanero, S.3
  • 52
    • 79960583168 scopus 로고    scopus 로고
    • The Big Picture of insider it sabotage across U.S. critical infrastructures
    • S J Stolfo, SM Bellovin, AD Keromytis, S Hershkop, SW Smith, S Sinclair, Springer US
    • AP Moore, DM Cappelli, and RF Trzeciak The Big Picture of insider it sabotage across U.S. critical infrastructures S J Stolfo, SM Bellovin, AD Keromytis, S Hershkop, SW Smith, S Sinclair, Insider Attack and Cyber Security 39 2008 Springer US 17 52
    • (2008) Insider Attack and Cyber Security , vol.39 , pp. 17-52
    • Moore, A.P.1    Cappelli, D.M.2    Trzeciak, R.F.3
  • 53
    • 83455235904 scopus 로고    scopus 로고
    • Current intrusion detection techniques in information technology - A detailed analysis
    • GM Nazer, and AAL Selvakumar Current intrusion detection techniques in information technology - a detailed analysis European Journal of Scientific Research 65 2011 611 624
    • (2011) European Journal of Scientific Research , vol.65 , pp. 611-624
    • Nazer, G.M.1    Selvakumar, A.A.L.2
  • 54
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A Patcha, and J-M Park An overview of anomaly detection techniques: existing solutions and latest technological trends Computer Networks 51 2007 3448 3470
    • (2007) Computer Networks , vol.51 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 55
    • 84926184444 scopus 로고    scopus 로고
    • Autonomic agent-based self-managed intrusion detection and prevention system
    • Port Elizabeth, South Africa
    • Patel A, Qassim Q, Shukor Z, Nogueira J, Júnior J, Wills C, Autonomic agent-based self-managed intrusion detection and prevention system, in South African information security multi-conference (SAISMC 2010), Port Elizabeth, South Africa, pp. 223-24, 2009.
    • (2009) South African Information Security Multi-conference (SAISMC 2010) , pp. 223-224
    • Patel, A.Q.1
  • 58
    • 27644590551 scopus 로고    scopus 로고
    • Data mining and machine learning - Towards reducing false positives in intrusion detection
    • T Pietraszek, and A Tanner Data mining and machine learning - towards reducing false positives in intrusion detection Information Security Technical Report 10 2005 169 183
    • (2005) Information Security Technical Report , vol.10 , pp. 169-183
    • Pietraszek, T.1    Tanner, A.2
  • 59
    • 78449264726 scopus 로고    scopus 로고
    • Incremental hybrid intrusion detection using ensemble of weak classifiers
    • H Sarbazi-Azad, B Parhami, S-G Miremadi, S Hessabi, Springer Berlin Heidelberg
    • A Rasoulifard, A Ghaemi Bafghi, and M Kahani Incremental hybrid intrusion detection using ensemble of weak classifiers H Sarbazi-Azad, B Parhami, S-G Miremadi, S Hessabi, Advances in Computer Science and Engineering 6 2009 Springer Berlin Heidelberg 577 584
    • (2009) Advances in Computer Science and Engineering , vol.6 , pp. 577-584
    • Rasoulifard, A.1    Ghaemi Bafghi, A.2    Kahani, M.3
  • 61
    • 58149104386 scopus 로고    scopus 로고
    • Guide to Intrusion Detection and Prevention Systems (idps)
    • NIST
    • K Scarfone, and P Mell Guide to Intrusion Detection and Prevention Systems (idps) Special Publication 800 2007 NIST p. 94
    • (2007) Special Publication , vol.800 , pp. 94
    • Scarfone, K.1    Mell, P.2
  • 65
    • 33748619234 scopus 로고    scopus 로고
    • Applying genetic algorithm for classifying anomalous TCP/IP packets
    • T Shon, X Kovah, and J Moon Applying genetic algorithm for classifying anomalous TCP/IP packets Neurocomputing 69 2006 2429 2433
    • (2006) Neurocomputing , vol.69 , pp. 2429-2433
    • Shon, T.1    Kovah, X.2    Moon, J.3
  • 66
    • 79960708660 scopus 로고    scopus 로고
    • A multiagent-based intrusion detection system with the support of multi-class supervised classification
    • L Cao, Springer US
    • M-L Shyu, and V Sainani A multiagent-based intrusion detection system with the support of multi-class supervised classification L Cao, Data Mining and Multi-agent Integration 2009 Springer US 127 142
    • (2009) Data Mining and Multi-agent Integration , pp. 127-142
    • Shyu, M.-L.1    Sainani, V.2
  • 67
    • 3042640871 scopus 로고    scopus 로고
    • A smart sensor to detect the falls of the elderly
    • A. Smith, and N Johnson A smart sensor to detect the falls of the elderly Pervasive Computing, IEEE 3 2004 42 47
    • (2004) Pervasive Computing, IEEE , vol.3 , pp. 42-47
    • Smith, A.1    Johnson, N.2
  • 69
    • 71649091715 scopus 로고    scopus 로고
    • Reducing false positives in intrusion detection systems
    • GP Spathoulas, and SK Katsikas Reducing false positives in intrusion detection systems Computers & Security 29 2010 35 44
    • (2010) Computers & Security , vol.29 , pp. 35-44
    • Spathoulas, G.P.1    Katsikas, S.K.2
  • 70
    • 38049134012 scopus 로고    scopus 로고
    • Distributed instrusion prevention in active and extensible networks active networks
    • G Minden, K Calvert, M Solarski, M Yamamoto, Springer Berlin/Heidelberg
    • T Sproull, and J Lockwood Distributed instrusion prevention in active and extensible networks active networks G Minden, K Calvert, M Solarski, M Yamamoto, Lecture Notes in Computer Science 3912 2007 Springer Berlin/Heidelberg 54 65
    • (2007) Lecture Notes in Computer Science , vol.3912 , pp. 54-65
    • Sproull, T.1    Lockwood, J.2
  • 71
  • 72
    • 67349229828 scopus 로고    scopus 로고
    • A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach
    • M-Y Su, G-J Yu, and C-Y Lin A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach Computers & Security 28 2009 301 309
    • (2009) Computers & Security , vol.28 , pp. 301-309
    • Su, M.-Y.1    Yu, G.-J.2    Lin, C.-Y.3
  • 73
    • 66449123983 scopus 로고    scopus 로고
    • Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS
    • BK Sy Integrating intrusion alert information to aid forensic explanation: an analytical intrusion detection framework for distributive IDS Inf. Fusion 10 2009 325 341
    • (2009) Inf. Fusion , vol.10 , pp. 325-341
    • Sy, B.K.1
  • 76
    • 77955430292 scopus 로고    scopus 로고
    • A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
    • GC Tjhai, SM Furnell, M Papadaki, and NL Clarke A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm Computers & Security 29 2010 712 723
    • (2010) Computers & Security , vol.29 , pp. 712-723
    • Tjhai, G.C.1    Furnell, S.M.2    Papadaki, M.3    Clarke, N.L.4
  • 79
    • 69349098776 scopus 로고    scopus 로고
    • Cloud computing and the common man
    • J Viega Cloud computing and the common man Computer 42 2009 106 108
    • (2009) Computer , vol.42 , pp. 106-108
    • Viega, J.1
  • 80
    • 77954931494 scopus 로고    scopus 로고
    • Ntrusion detection for grid and cloud computing
    • K Vieira, A Schulter, and C Westphall Ntrusion detection for grid and cloud computing IT Professional 12 2010 38 43
    • (2010) IT Professional , vol.12 , pp. 38-43
    • Vieira, K.1    Schulter, A.2    Westphall, C.3
  • 84
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • SX Wu, and W Banzhaf The use of computational intelligence in intrusion detection systems: a review Applied Soft Computing 10 2010 1 35
    • (2010) Applied Soft Computing , vol.10 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 87
    • 78049324449 scopus 로고    scopus 로고
    • Correlation analysis of intrusion alerts
    • Springer US 65-92
    • D Xu, and P Ning Correlation analysis of intrusion alerts Intrusion Detection Systems 38 2008 Springer US 65-92
    • (2008) Intrusion Detection Systems , vol.38
    • Xu, D.1    Ning, P.2
  • 88
    • 78049461565 scopus 로고    scopus 로고
    • A cost-based analysis of intrusion detection system configuration under active or passive response
    • WT Yue, and M Çakanyldrm A cost-based analysis of intrusion detection system configuration under active or passive response Decision Support System 50 2010 21 31
    • (2010) Decision Support System , vol.50 , pp. 21-31
    • Yue, W.T.1    Çakanyldrm, M.2
  • 90
    • 70350432620 scopus 로고    scopus 로고
    • A new intrusion detection method based on antibody concentration emerging intelligent computing technology and applications
    • D-S Huang, K-H Jo, H-H Lee, H-J Kang, V Bevilacqua, Springer Berlin/ Heidelberg
    • J Zeng, T Li, G Li, and H Li A new intrusion detection method based on antibody concentration emerging intelligent computing technology and applications D-S Huang, K-H Jo, H-H Lee, H-J Kang, V Bevilacqua, With Aspects of Artificial Intelligence 5755 2009 Springer Berlin/ Heidelberg 500 509
    • (2009) With Aspects of Artificial Intelligence , vol.5755 , pp. 500-509
    • Zeng, J.1    Li, T.2    Li, G.3    Li, H.4
  • 91
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • CV Zhou, C Leckie, and S Karunasekera A survey of coordinated attacks and collaborative intrusion detection Computers & Security 29 2010 124 140
    • (2010) Computers & Security , vol.29 , pp. 124-140
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.