Enforcing trust-based intrusion detection in cloud computing using algebraic methods

Amira Bradai, Hossam Afifi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A trust-based intrusion detection scheme for hybrid cloud computing is proposed. We consider a trust metric based on honesty, cooperation and efficiency for detecting malicious machines. We use Perron-Frobenius theorem to detect intrusion based on trust and observations. By statistically analyzing pair trust distributed results, the portal of the application applies trust-based intrusion detection to assess the trustworthiness and maliciousness. An analytical model and simulation for performance are developed. We analyze the sensitivity of false alarms with respect to the minimum trust threshold below which a node is considered malicious. Results confirm that our proposal is flexible enough to detect malicious behaviours considering various parameters. This work can guide future execution in the cloud resource.

Original languageEnglish
Title of host publicationProceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2012
Pages185-190
Number of pages6
DOIs
Publication statusPublished - 1 Dec 2012
Externally publishedYes
Event4th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2012 - Sanya, China
Duration: 10 Oct 201212 Oct 2012

Publication series

NameProceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2012

Conference

Conference4th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2012
Country/TerritoryChina
CitySanya
Period10/10/1212/10/12

Keywords

  • PerronFrobenius
  • cloud computing
  • false alarms
  • hybrid execution
  • intrusion detection
  • security scores
  • trust management

Fingerprint

Dive into the research topics of 'Enforcing trust-based intrusion detection in cloud computing using algebraic methods'. Together they form a unique fingerprint.

Cite this