TY - GEN
T1 - A New Approach Based on a Multi-Agent System for IDS in Cloud Computing
AU - Kassimi, Dounya
AU - Kazar, Okba
AU - Barka, Ezedin
AU - Merizig, Abdelhak
AU - Houhamdi, Zina
AU - Athamena, Belkacem
AU - Zaoui, Meftah
N1 - Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - Cloud computing is a recent innovation in the IT industry that is expanding quickly. Furthermore, this technology is widely used to provide computation, data storage, and other resources remotely through the web on a pay-per-usage basis. It is now the favored option for any IT firm since it increases its capacity to satisfy the computing requirements of its everyday operations through scalability, mobility, and flexibility at a low price. But there are two key problems with cloud computing. The biggest issue is storage-related, and Google has addressed it by adding a new layer to the cloud dubbed 'Big data as a service (BDaaS).' The second problem is security and privacy. The Intrusion Detection System (IDS) has become the most widely utilized component of computer systems, security, and compliance processes, safeguarding network-accessible Cloud resources and services from various threats and assaults. This study examines IDS approaches in Cloud Computing and big data sets. To identify anomalous data in BDaaS, we also suggested a sensible intrusion detection system (SIDS) based on the autonomic system. The agent contributes the most to introducing more proprieties, particularly the autonomy element.
AB - Cloud computing is a recent innovation in the IT industry that is expanding quickly. Furthermore, this technology is widely used to provide computation, data storage, and other resources remotely through the web on a pay-per-usage basis. It is now the favored option for any IT firm since it increases its capacity to satisfy the computing requirements of its everyday operations through scalability, mobility, and flexibility at a low price. But there are two key problems with cloud computing. The biggest issue is storage-related, and Google has addressed it by adding a new layer to the cloud dubbed 'Big data as a service (BDaaS).' The second problem is security and privacy. The Intrusion Detection System (IDS) has become the most widely utilized component of computer systems, security, and compliance processes, safeguarding network-accessible Cloud resources and services from various threats and assaults. This study examines IDS approaches in Cloud Computing and big data sets. To identify anomalous data in BDaaS, we also suggested a sensible intrusion detection system (SIDS) based on the autonomic system. The agent contributes the most to introducing more proprieties, particularly the autonomy element.
KW - anomaly-based detection
KW - big data
KW - data mining
KW - intrusion detection system (IDS)
KW - intrusion prevention system (IPS)
KW - machine learning
KW - network security
KW - signature-based detection
UR - http://www.scopus.com/inward/record.url?scp=85150680239&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85150680239&partnerID=8YFLogxK
U2 - 10.1109/SDS57574.2022.10062930
DO - 10.1109/SDS57574.2022.10062930
M3 - Conference contribution
AN - SCOPUS:85150680239
T3 - 2022 9th International Conference on Software Defined Systems, SDS 2022
BT - 2022 9th International Conference on Software Defined Systems, SDS 2022
A2 - Boubshir, Larbi
A2 - Daachi, Boubaker
A2 - Mokrane, Abdellah
A2 - Jararweh, Yaser
A2 - Elhadj, Benkhelifa
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 9th International Conference on Software Defined Systems, SDS 2022
Y2 - 12 December 2022 through 15 December 2022
ER -