فصلنامه تخصصی فناوری اطلاعات و ارتباطات

رویکردهای مقابله با چالش نفوذ در خدمات رایانش ابری

نوع مقاله : مقاله پژوهشی

نویسنده

گروه مهندسی کامپیوتر ، واحد خدابنده ، دانشگاه آزاد اسلامی، خدابنده، ایران

10.22034/apj.2026.729994
چکیده
 
امروزه رایانش ابری به دلیل خدمات انعطاف پذیر و ویژگی برجسته مبتنی بر پرداخت خدمات به میزان استفاده، انتخاب و برگزیده هر سازمان مبتنی بر فناوری اطلاعات و ارتباطات است. برخی شبکه­های مبتنی بر رایانش ابری به علت فقدان زیرساخت ثابت و مدیریت متمرکز با چالشهای امنیتی مختلفی روبرو هستند. با این وجود، امنیت و حریم شخصی سیستمهای رایانش ابری به دلیل معماری توزیع شده­ی آنها و آسیب پذیری در برابر ورودی­های ناخواسته مشکل اساسی رایانش ابری است. نقش سیستمهای شناسایی حمله­های ناخواسته در امنیت ابر بسیار مهم است زیرا مانند یک لایه­ی پیشگیرانه­ی امنیتی عمل می­کند و علاوه بر شناسایی حمله­های شناخته شده می­تواند بسیاری از حمله­های ناشناخته را کشف کند. در این مقاله قصد داریم این سیستم های را بررسی نموده و رویکردهای مقابله با چالش نفوذ در خدمات رایانش ابری را توصیف نمائیم.

کلیدواژه‌ها


عنوان مقاله English

Approaches to Address the Challenge of Intrusion in Cloud Computing Services

نویسنده English

Hossein Mansouri
Department of Computer Engineering, Khodabandeh Branch, Islamic Azad University, Khodabandeh, Iran
چکیده English

 Nowadays, cloud computing is the preferred choice of any organization based on information and communication technology due to its flexible services and outstanding pay-as-you-go features. Some cloud-based networks face various security challenges due to the lack of fixed infrastructure and centralized management. However, the security and privacy of cloud computing systems is a fundamental problem of cloud computing due to their distributed architecture and vulnerability to unwanted inputs. The role of unwanted attack detection systems in cloud security is very important because it acts as a preventive security layer and, in addition to identifying known attacks, can detect many unknown attacks. In this article, we intend to review these systems and describe approaches to deal with the challenge of intrusion into cloud computing services.

کلیدواژه‌ها English

Cloud Computing
Security
Disturbance Penetration
Attack
J. Joaquim, k. bakhtiyari and m. J. o. N. a. C. A. a. taghavi, "Journal of Network and Computer Application authors Mona Taghavi, Kaveh Bakhtiyari ,Joaquim Junior".
W. M. E. و M. H. J., “"Principles of information security," ed: Course Technology Ptr, 2011, p. 315”.
K. Scarfone و P. Mell, “K. Scarfone and P. Mell, "Guide to intrusion detection and prevention systems (idps)," NIST Special Publication, vol. 800, p. 94, 2007.”.
G. Thatte, U. Mitra و J. Heidemann, “G. Thatte, U. Mitra, and J. Heidemann, "Parametric methods for anomaly detection in aggregate traffic,"IEEE/ACM Transactions on Networking (TON), vol. 19, pp. 512-525, 2011.”.
X. D. Hoang, J. Hu و P. Bertok,, “"A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference," Journal of Network and Computer Applications, vol. 32, pp. 1219-”.
H. T. Elshoush و I. M. Osman, “"Alert correlation in collaborative intelligent intrusion detection systems A survey," Applied Soft Computing, vol. 11, pp. 4349-4365, 2011.”.
J. M. Estevez-Tapiador, P. Garcia-Teodoro و E. Diaz-Verdejo, “"Anomaly detection methods in wired networks: a survey and taxonomy," Computer Communications, vol. 27, pp. 1569-1584, 2004”.
H. T. Elshoush و I. M. Osman, “"Alert correlation in collaborative intelligent intrusion detection systems A survey," Applied Soft Computing, vol. 11, pp. 4349-4365, 2011.”.
M. Leitner, P. Leitner, M. Zach و C. Fahy, “"Fault management based on peer-to-peer paradigms; a case study report from the celtic project madeira," in 10th IFIP/IEEE International Symposium”.
C. V. Zhou, C. Leckie و S. Karunasekera, “"A survey of coordinated attacks and collaborative intrusion detection," Computers & Security, vol. 29, pp. 124-140, 2010.”.
A. Patcha و J.-M. Park, “"An overview of anomaly detection techniques: Existing solutions and latest technological trends," Computer Networks, vol. 51, pp. 3448-3470, 2007”.
R. Perdisci, G. Giacinto و F. Roli, “"Alarm clustering for intrusion detection systems in computer networks," Engineering Applications of Artificial Intelligence, vol. 19, pp. 429-438, 2006”.
J. E. Gaffney Jr و J. W. Ulvila, “"Evaluation of intrusion detectors: A decision theory approach," in IEEE Symposium on Security and Privacy, 2001. S&P 2001, Oakland, CA , USA. pp.50-61, 2001, pp. 50-61”.
A. P. Moore, D. M. Cappelli و R. F. Trzeciak, “"The “Big Picture” of Insider IT Sabotage Across U.S Critical Infrastructures," in Insider Attack and Cyber Security. vol. 39, S. J. Stolfo, S. M. Bellovin, A. D.”.
P. García-Teodoro, J. Díaz-Verdejo, G. Maciá-Fernández و E. Vázquez, “"Anomaly-based network intrusion detection: Techniques, systems and challenges," Computers & Security, vol. 28, pp. 18-28,”.
M. Xie, B. Tian و S. Parvin, “"Anomaly detection in wireless sensor networks: A survey," Journal of Network and Computer Applications, vol. 34, pp. 1302-1325, 2011”.
S. Khanum, M. Usman و A. Alwabel, “"Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks," International Journal of Computer Science Issues, IJCSI, vol. 9, 2012.”.
O. Chung-Ming, “O. Chung-Ming, "Host-based intrusion detection systems adapted from agent-based artificial immune systems," Neurocomputing, 2012”.
A. Jaiswal و S. Jain, “"Database Intrusion Prevention Cum Detection System with Appropriate Response," International Journal of Information Technology, vol. 2, pp. 651-656, 2010.”.
K. Vieira, A. Schulter و C. Westphall, “"Intrusion Detection for Grid and Cloud Computing," IT Professional, vol. 12, pp. 38-43, 2010”.
Y. Li, C. Jing و J. Xu, “"A New Distributed Intrusion Detection Method Based on Immune Mobile Agent Life System Modeling and Intelligent Computing." vol. 6328, K. Li, M. Fei, L. Jia, and G. Irwin, Eds., ed: Springer Berlin / Heidelberg, 2010, pp. 233-243”.
O. Awodele, S. Idowu, O. Anjorin و V. J. Joshua, “"A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS)," Issues in Informing Science and Information Technology, vol. 6, 2009”.
M.-L. Shyu و V. Sainani, “"A Multiagent-based Intrusion Detection System with the Support of Multi-Class Supervised Classification," in Data Mining and Multi-agent Integration, L. Cao, Ed., ed: Springer US, 2009, pp. 127-142.”.
A. Rasoulifard, A. Ghaemi Bafghi و M. Kahani, “"Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers," in Advances in Computer Science and Engineering. vol. 6, H. Sarbazi-Azad, B. Parhami, S.-G. Miremadi, and S. Hessabi, Eds., ed: Springer Berlin Heidelberg, 2009, pp. 577-584”.
M.-Y. Su, G.-J. Yu و C.-Y. Lin, “"A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach," Computers & Security, vol. 28, pp. 301-309, 2009.”.
Á. Herrero و E. Corchado, “"Mining Network Traffic Data for Attacks through MOVICAB-IDS Foundations of Computational Intelligence Volume 4." vol. 204, A. Abraham, A.-E. Hassanien, and A. de Carvalho, Eds., ed: Springer Berlin / Heidelberg, 2009, pp. 377-394”.
A. Byrski و M. Carvalho, “"Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks Computational Science – ICCS 2008." vol. 5103, M. Bubak, G. van Albada, J. Dongarra, and P. Sloot, Eds., ed: Springer Berlin / Heidelberg, 2008, pp. 584-593.”.