CIDS: A framework for intrusion detection in cloud systems

HA Kholidy, F Baiardi - 2012 Ninth International Conference on …, 2012 - ieeexplore.ieee.org
By impersonating legitimate users, intruders can use the abundant resources of cloud
computing environments. This paper develops a framework for" CIDS" a cloud based …

[PDF][PDF] An overview of recent advances in intrusion detection

M Marhusin, D Cornforth, H Larkin - 2008 - dro.deakin.edu.au
The intrusion detection system is one of the security defense tools for computer networks. In
recent years this research has lacked in direction and focus. In this paper we present a …

Intrusion detection for computational grids

A Schulter, K Vieira, C Westphall… - … Mobility and Security, 2008 - ieeexplore.ieee.org
Current intrusion detection technology is limited in providing protection against the
intrusions that may violate the security of computational grids. We present the problem of …

A grid-based intrusion detection system

A Schulter, JA Reis, F Koch… - … Conference on Systems …, 2006 - ieeexplore.ieee.org
This paper presents the problem of intrusion detection in grid environments. Current
intrusion detection technology is limited in providing protection against the attacks that may …

Towards grid-based intrusion detection

A Schulter, F Navarro, F Koch… - 2006 IEEE/IFIP Network …, 2006 - ieeexplore.ieee.org
Current intrusion detection technology is limited in providing protection against the
intrusions that may violate the security of computational grids. We present the problem of …

A streaming intrusion detection system for grid computing environments

M Smith, F Schwarzer, M Harbach… - 2009 11th IEEE …, 2009 - ieeexplore.ieee.org
In this paper, a novel architecture for a streaming intrusion detection system for Grid
computing environments is presented. Detection mechanisms based on traditional log-files …

Intrusion detection system for grid computing using SNORT

M Kumar, M Hanumanthappa… - 2012 International …, 2012 - ieeexplore.ieee.org
Because of distributed nature, grid computing environments are easy targets for intruders
looking for possible vulnerabilities to exploit [1]. By impersonating legitimate users, the …

Detecting global anomalies

S Srinivasa, PS Pawar - US Patent 8,296,850, 2012 - Google Patents
Abstract Systems and methods of detecting distributed attacks that pose a threat affecting
more than one node in the network. The distributed attacks include events that appear …

Fast attack detection using correlation and summarizing of security alerts in grid computing networks

RH Syed, J Pazardzievska, J Bourgeois - The Journal of Supercomputing, 2012 - Springer
Due to the extensive growth of grid computing networks, security is becoming a challenge.
Usual solutions are not enough to prevent sophisticated attacks fabricated by multiple users …

GHIDS: Defending computational grids against misusing of shared resources

G Feng, X Dong, W Liu, Y Chu… - 2006 IEEE Asia-Pacific …, 2006 - ieeexplore.ieee.org
Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional
Host-based Intrusion Detecting System (HIDS) is not suitable for grid environment. Grid …