Wednesday 24th of April 2024
 

Internet Intrusion Detection System Service in a Cloud


Amirreza Zarrabi and Alireza Zarrabi

Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. It is defined as a computer network system to collect information on a number of key points, and analyze this information to see whether there are violations of network security policy behavior and signs of attack. IDS aroused the concern of users as an important computer network security technology. In recent times, with the advent of Cloud Computing, the concepts of Software as a Service (SaaS), where vendors provide key software products as services over the internet that can be accessed by users to perform complex tasks, have become increasingly popular. Cloud Computing is a method to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. We introduce a Cloud Intrusion Detection System Services (CIDSS) which is developed based on Cloud Computing and can make up for the deficiency of traditional intrusion detection, and proved to be great scalable. CIDSS can be utilized to overcome the critical challenge of keeping the client secure from cyber attacks while benefit the features which are presented by Cloud Computing technology.

Keywords: Intrusion Detection System, Cloud Computing, Software as a Service

Download Full-Text


ABOUT THE AUTHORS

Amirreza Zarrabi
Amirreza Zarrabi is master’s degree student in the University Putra Malaysia. His research interests are in computer architecture, device modeling, embedded systems, operating systems, system security, web services, and distributed computing. During his thesis, he was working on distributed memory, file management, and process migration in Linux operating system. Currently he is working on robust transport protocol for dynamic high-speed networks and dynamic servers as a research engineer in an international investment solution provider company in Kuala Lumpur.

Alireza Zarrabi
Alireza Zarrabi has received his master\'s degree in information technology from University Malaya in 2010. His area of interest consists of information security, security auditing, vulnerability scanning, penetration testing, operating systems, distributed systems, and cluster computing. During his master\'s degree he worked on Steganography and currently he is working on cluster computing in enterprise environments as a research engineer in an international investment solution provider company in Kuala Lumpur.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »