0704-883-0675     |      dataprojectng@gmail.com

MULTI-LEVEL INTRUSION DETECTION AND LOG MANAGEMENT SYSTEM IN CLOUD COMPUTING

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for : Student Researchers
  • NGN 3000

INTRODUCTION

As Green IT has been issued, many companies have started to find ways to decrease IT cost and overcome economic recession. Cloud Computing service is a new computing paradigm in which people only need to pay for use of services without cost of purchasing physical hardware. For this reason, Cloud Computing has been rapidly developed along with the trend of IT services. It is efficient and cost economical for consumers to use computing resources as much as they need or use services they want from Cloud Computing provider. Especially, Cloud Computing has been recently more spotlighted than other computing services because of its capacity of providing unlimited amount of resources. Moreover, consumers can use the services wherever Internet access is possible, so Cloud Computing is excellent in the aspect of accessibility. Cloud Computing systems have a lot of resources and private information, therefore they are easily threatened by attackers. Especially, System administrators potentially can become attackers. Therefore, Cloud Computing providers must protect the systems safely against both insiders and outsiders. IDSs are one of the most popular devices for protecting Cloud Computing systems from various types of attack. Because an IDS observes the traffic from each VM and generates alert logs, it can manage Cloud Computing globally. Another important problem is log management. Cloud Computing systems are used by many people, therefore, they generate huge amount of logs. So, system administrators should decide to which log should be analysed first.

Cloud Computing is a fused-type computing paradigm which includes Virtualization, Grid Computing, Utility Computing, Server Based Computing(SBC), and Network Computing, rather than an entirely new type of computing technique. Cloud computing has evolved through a number of implementations. Moving data into the cloud provides great convenience to users. Cloud computing is a collection of all resources to enable resource sharing in terms of scalable infrastructures, middleware and application development platforms, and value-added business applications. The characteristics of cloud computing includes: virtual, scalable, efficient, and flexible. In cloud computing, three kinds of services are provided: Software as a Service (SaaS) systems, Infrastructure as a Service (IaaS) providers, and Platform as a Service (PaaS). In SaaS, systems offer complete online applications that can be directly executed by their users; In IaaS, providers allow their customers to have access to entire virtual machines; and in SaaS, it offers development and deployment tools, languages and APIs used to build, deploy and run applications in the cloud.

A cloud is subject to several accidental and intentional security threats, including threats to the integrity, confidentiality and availability of its resources, data and infrastructure. Also, when a cloud with large computingpower and storage capacity is misused by an ill-intentioned party for malicious purposes, the cloud itself is a threat against society. Intentional threats are imposed by insiders and external intruders. Insiders are legitimate cloud users who abuse their privileges by using the cloud for unintended purposes and we consider this intrusive behaviour to be detected. An intrusion consists of an attack exploiting a security flaw and a consequent breach which is the resulting violation of the explicit or implicit security policy of the system. Although an intrusion connotes a successful attack, IDSs also try to identify attacks that don't lead to compromises. Attacks and intrusions‖ are commonly considered synonyms in the intrusion detection context. The underlying network infrastructure of a cloud, being an important component of the computing environment, can be the object of an attack. Grid and cloud applications running on compromised hosts are also a security concern. We consider attacks against any network or host participating in a cloud as attacks against that, since they may directly or indirectly affect its security aspects. Cloud systems are susceptible to all typical network and computer security attacks, plus specific means of attack because of their new protocols and services.





Related Project Materials

STUDIES ON ANTIHAEMORRHAGIC AND ANTIBACTERIAL PROPERTIES OF BULB JUICE, ETHANOL AND AQUEOUS EXTRACTS OF ALLIUM SATIVUM LINN. (LILLIACEAE) AGAINST MENINGEAL BACTERIA

ABSTRACT

Bacterial meningitis (BM) is a devastating air-borne infectious disease of humans that causes cellular hemorrhagic sepsis, metab...

Read more
VEHICLE CRASH LOCATION DETECTION AND ALERTING SYSTEM USING ANDROID SMART PHONE AND GPS TECHNOLOGIES

ABSTRACT

Nowadays varying degrees of road crashes have been recorded from both developed and developing nations of the world. Crashes esp...

Read more
IMPACT OF SINGLE-PARENTING ON ACADEMIC ACHIEVEMENT OF STUDENTS IN SELECTED SECONDARY SCHOOLS

ABSTRACT

The descriptive survey research was adopted in this study. It is an attempt to investigate the impact of single-parenting on aca...

Read more
DETERMINATION OF OPTIMUM PACKAGING AND STORAGE PROPERTIES OF PACKAGED GARRI

ABSTRACT

This study was on the determination of optimum packaging and storage properties of packaged ga...

Read more
THE IMPACT OF BANDITARY ON THE SOCIOECONOMIC DEVELOPMENT OF KUTA (A STUDY OF SHIRORO LOCAL GOVERNMENT OF NIGER STATE)

Background of the Study

Banditry has indeed emerged as a significant security threat in various regions...

Read more
THE IMPACT OF MANAGEMENT ACCOUNTING TECHNIQUES ON ORGANIZATIONAL DECISION MAKING

ABSTRACT

The study examined the impact of management accounting techniques on organizational decision m...

Read more
Characters and Voices- The Bildungsroman Tradition in Selected Third Generation Nigerian Novels

Background to the Study

Early twenty-first century witnessed the emergence of new voices in Nigerian literature, especially, the novel ge...

Read more
EFFECTS OF WATER-SOLUBLE FRACTIONS OF USED CRANKCASE OIL ON SOME PHYSIOLOGICAL PARAMETERS OF THE NILE TILAPIA (OREOCHROMIS NILOTICUS

ABSTRACT

Used crankcase oil is disposed off indiscriminately and it eventually finds its way into the aquatic environment resulting in su...

Read more
ASSESSING THE BENEFITS OF EARLY CHILDHOOD EDUCATION ON LOCAL ECONOMIC DEVELOPMENT

ABSTRACT: This study assessed the Benefits of Early Childhood Education on Local Economic Development. The o...

Read more
CYBERSECURITY RISKS AND FINANCIAL REPORTING INTEGRITY

Abstract

This study examines the impact of cybersecurity risks on financial reporting integrity in Ogun...

Read more
Share this page with your friends




whatsapp