Intrusion Detection Techniques for Mobile Cloud Computing in Heterogeneous 5g
Main Article Content
Abstract
As the importance of distributed computers is rapidly growing, they are becoming the target of more and more crime. Intrusion may be defined as the set of attempts to compromise computer network security. Besides the several security services, Intrusion Detection System/Techniques are taken into point that strengthen the system security and is more powerful in preventing internal and external attacks. This technique is considered to be very efficient in preventing wireless communication in Fifth Generation. In this paper we will discuss what Mobile Cloud Computing is and various Intrusion Detection Techniques for mobile computing along with challenges faced by each technique.
Article Details
References
1. Huang, D. (2011). Mobile cloud computing. IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter.
2. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G Keke Gai1, Meikang Qiu1 *, Lixin Tao1 and Yongxin Zhu2.
3. Kumar K, Lu Y. Cloud computing for mobile users: can offloading computation save energy? Computer 2010.
4. Shiraz M, Gani A, Khokhar RH, Buyya R. A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing.
5. Miettinen AP, Nurminen JK. Energy efficiency of mobile clients in cloud computing, Proceedings of the 2nd USENIX Workshop on Hot Topics in Cloud Computing, Boston, MA, 2010.
6. Simoens P, Turck FD, Dhoedt B, Demeester P. Remote display solutions for mobile cloud computing. IEEE Internet Computing 2011.
7. Qiu M, Su H, Chen M, Ming Z, Yang LT. Balance of security strength and energy for a PMU monitoring system in smart grid. IEEE Communications Magazine 2012.
8. Qiu M, Gao W, Chen M, Niu J, Zhang L. Energy efficient security algorithm for power grid wide area monitoring system. IEEE Transactions on Smart Grid 2011.
9. Qiu M, Zhang L, Ming Z, Chen Z, Qin X, Yang LT.Security-aware optimization for ubiquitous computing systems with SEAT graph approach. Journal of Computer and System Sciences 2013.
10. Hu F, Qiu M, Li J, Grant T, Taylor D, McCaleb S, et al. A review on cloud computing: design challenges in architecture andsecurity. Journal of Computing and Information Technology 2011.
11. Gai K, Li S. Towards cloud computing: a literature review on cloud computing and its development trends, 2012 Fourth International Conference on Multimedia Information Networking and Security, Nanjing, China, 2012; 142–146. IEEE.
12. Marozzo F, Talia D, Trunfio P. P2P-MapReduce: parallel data processing in dynamic cloud environments. Journal of Computer and System Sciences 2012.
13. Masdari M, Zebardast B, Lotfi Y. Towards virtualization in cloud computing. International Journal of Advanced Research in Computer Science 2013.
14. Wang Y, Sun W, Zhou S, Pei X, Li X. Key technologies of distributed storage for cloud computing. Journal of Software 2012.
15. Zhang S, Yan H, Chen X. Research on key technologies of cloud computing. In Physics Procedia. Elsevier: Beijing, China, 2012.
16. Messaoud E HB, Diouri O. Web service security: overview, analysis and challenges. International Journal of Computer Science Issues 2014.
17. Ma Z, Sheng Z, Gu L. DVM: a big virtual machine for cloud computing. IEEE Transactions on Computers 2013
18. Zhang S, Yan H, Chen X. Research on key technologies of cloud computing. In Physics Procedia. Elsevier: Beijing, China, 2012
19. Ma Z, Sheng Z, Gu L. DVM: a big virtual machine for cloud computing. IEEE Transactions on Computers 2013
20. Luo Y. Network I/O virtualization for cloud computing. IT Professional Magazine 2010
21. Chaudhary D, Chhillar RS. Reverse host allocation approach for virtual machine cloud computing environment. International Journal of Computer Applications 2013.
22. Langer SG, French T. Virtual machine performance benchmarking. Journal of Digital Imaging 2011.
23. Bright PP, Bijolin EE. Energy efficient virtual machine monitoring architecture for green cloud computing. International Journal of Computer Applications 2013.
24. Lovsz G, Niedermeier F, Meer HD. Performance tradeoffs of energy-aware virtual machine consolidation. Cluster Computing 2013
25. Zhang F, Chen H. Security-preserving live migration of virtual machine in the cloud. Journal of Network and Systems Management 2013.
26. Wang Z, Liu M, Zhang S, Qiu M. Sensor virtualization for underwater event detection. Journal of Systems Architecture 2014.
27. Modi C, Patel D, Borisaniya B, Patel H. A survey of instrusion detection techniques in cloud. Journal of Network and Computer Applications 2013
28. Liao H, Lin CR, Lin Y, Tung K. Intrusion detection system: a comprehensive review. Journal of Network and Computer Applications 2013
29. Lin Q, Qi Z, Wu J, Dong Y, Guan H. Optimizing virtual machines using hybrid virtualization. Journal of Systems and Software 2012.
30. Gani A, Nayeem GM, Shiraz M, Sookhak M, Whaiduzzaman M, Khan S. A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing. Journal of Network and Computer Applications 2014.
31. Dobre C, Xhafa F. Parallel programming paradigms and frameworks in big data era. International Journal of Parallel Programming 2014.
32. Lei W, Hai W, Yu Y, Fei Z. Heterogeneous network in LTE-advanced system, Proceedings of 2010 IEEE International Conference on Communication Systems, Singapore, 2010.
33. Tian Y, Lin C, Li K. Managing performance and power consumption tradeoff for multiple heterogeneous servers in cloud computing. Cluster Computing 2014.
34. Barbu OE, Fratu O. An enabler of interoperability in heterogeneous wireless networks, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Chennai, 2011.
35. Anjum, F., Subhadrabandhu, D., & Sarkar, S. (2003, October). Signature based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols. In Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th(Vol. 3, pp. 2152-2156). IEEE
36. Ocampo F, Castillo T, Gomez M. Automated signature creator for a signature based intrusion detection system with network attack detection capabilities. International Journal of Cyber-Security and Digital Forensics 2013.
37. Anbar M, Manickam S, Hosam A, Chai K, Baklizi M, Almomani A. Behaviour based worm detection and signature automation. Journal of Computer Science 2011
38. Cherniak A, Zadorozhny VI. Signature-based detection of notable transitions in numeric data streams. IEEE Transactions on Knowledge and Data Engineering 2013.
39. Meng W, Li W, Kwok L. EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Computers& Security 2014
40. Meng W, Li W, Kwok L. EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Computers& Security 2014.
41. Omar S, Ngadi A, Jebur HH. Machine learning techniques for anomaly detection an overview. International Journal of Computer Applications 2013
42. Stakhanova N, Basu S, Wong J. On the symbiosis of specification-based and anomaly-based detection Computer & Security 2010.
43. Gogoi P, Bhattacharyya DK, Borah B, Kalita K. MLHIDS a multi-level hybrid intrusion detection method The Computer Journal 2014.
44. Nadeem A, Howarth M. Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Telecommunication Systems 2013.
45. ydın, M. A., Zaim, A. H., & Ceylan, K. G. (2009). A hybrid intrusion detection system design for computer network security. Computers & Electrical Engineering, 35(3), 517-526.
46. Peddabachigari, S., Abraham, A., Grosan, C., & Thomas, J. (2007). Modeling intrusion detection system using hybrid intelligent systems. Journal of network and computer applications, 30(1), 114-132.
47. Zhang, J., & Zulkernine, M. (2006, April). A hybrid network intrusion detection technique using random forests. In Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on(pp. 8-pp). IEEE.
48. Hai, T. H., Khan, F., & Huh, E. N. (2007, August). Hybrid intrusion detection system for wireless sensor networks. In International Conference on Computational Science and Its Applications(pp. 383-396). Springer, Berlin, Heidelberg.
49. Nadeem A, Howarth M. Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Telecommunication Systems 2013.
50. Li J, Ding Y, Xiong Z, Liu S. An improved biometric based user authentication scheme for C/S system. International Journal of Distributed Sensor Networks 2014.
51. Meng W, Li W, Kwok L. EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Computers& Security 2014.
52. Nagarajan N. An anomaly-based network intrusion detection system using fuzzy logic. International Journalof Computer Science and Information Security2010.
53. Nagarajan N. An anomaly-based network intrusion detection system using fuzzy logic. International Journalof Computer Science and Information Security2010.
54. Sha W, Zhu Y, Huang T, Qiu M, Zhu Y, Zhang Q. A multi-order markov chain based scheme for anomaly detection, 2013 IEEE 37thAnnual Computer Software and Applications Conference Workshops (COMPSACW), IEEE, Japan, 2013.
55. Chora M, Saganowski L, Renk R, Houbowicz W. Statistical and signal based network traffic recognition for anomaly detection. Expert Systems 2012.
56. George A. Anomaly detection based on machine learning: dimensionality reduction using PCA and classification.
57. using SVM. International Journal of Computer Applications 2012.
58. Wagh SK, Pachghare VK, Kolhe SR. Survey on intrusion detection system using machine learning techniques.International Journal of Computer Applications 2013
59. Kheyri D, Karami M. A comprehensive survey on anomaly-based intrusion detection in MANET. Computer and Information Science 2012
60. Stakhanova N, Basu S, Wong J. On the symbiosis of specification-based and anomaly-based detection. Computer & Security 2010
61. Stakhanova N, Basu S, Wong J. On the symbiosis of specification-based and anomaly-based detection.Computer & Security 2010.
62. Whitman ME, Mattord HJ. Principles of Information Security, 4th edn. Information Security Professionals:Boston, MA, 2009
63. Frederick KK. Network intrusion detection signatures, part five, Symantec, November 2010 http://www.symantec.com/connect/articles/ network-intrusion-detection-signatures-part-five [Accessed on December 2014].
64. Teh PS, Teoh A BJ, Yue S. A survey of keystroke dynamics biometrics. The Scientific World Journal 2013.
65. Bhattacharyya D, Ranjan R, Alisherov FA, Choi M. Biometric authentication: a review. International Journal of U-and E-Service, Science and Technology 2009.
66. Babaeizadeh M, Bakhtiari M, Maarof MA. Keystroke dynamic authentication in mobile cloud computing. International Journal of Computer Applicatios 2014.
67. Frank M, Biedert R, Ma E, Martinovic I, Song D. Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics and Security 2014.
