This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Intrusion Detection for Grid and Cloud Computing
July/August 2010 (vol. 12 no. 4)
pp. 38-43
Kleber Vieira, UFSC, Florianopolis
Alexandre Schulter, UFSC, Florianopolis
Carlos Westphall, Federal University of Santa Catarina, Florianopolis
Carla Westphall, UFSC, Florianopolis

Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. The Grid and Cloud Computing Intrusion Detection System integrates knowledge and behavior analysis to detect intrusions.

1. H. Debar, M. Dacier, and A. Wespi, "Towards a Taxonomy of Intrusion Detection Systems," Int'l J. Computer and Telecommunications Networking, vol. 31, no. 9, 1999, pp. 805–822.
2. I. Foster et al., "A Security Architecture for Computational Grids," Proc. 5th ACM Conf. Computer and Communications Security, ACM Press, 1998, pp. 83–92.
3. S. Axelsson, Research in Intrusion-Detection Systems: A Survey, tech. report TR-98-17, Dept. Computer Eng., Chalmers Univ. of Technology, 1999.
4. A. Schulter et al., "Intrusion Detection for Computational Grids," Proc. 2nd Int'l Conf. New Technologies, Mobility, and Security, IEEE Press, 2008, pp. 1–5.
5. H. Franke et al., "Grid-M: Middleware to Integrate Mobile Devices, Sensors and Grid Computing," Proc. 3rd Int'l Conf. Wireless and Mobile Comm. (ICWMC 07), IEEE CS Press, 2007, p. 19.
6. N.B. Idris and B. Shanmugam, "Artificial Intelligence Techniques Applied to Intrusion Detection," Proc. 2005 IEEE India Conf. (Indicon) 2005 Conf., IEEE Press, 2005, pp. 52–55.
7. P.F. da Silva and C.B. Westphall, "Improvements in the Model for Interoperability of Intrusion Detection Responses Compatible with the IDWG Model," Int'l J. Network Management, vol. 17, no. 4, 2007, pp. 287–294.
1. F-Y. Leu et al., "Integrating Grid with Intrusion Detection," Proc. Int'l Conf. Advanced Information Networking and Applications (AINA 05), vol. 1, IEEE CS Press, 2005, pp. 304–309.
2. S. Kenny and B. Coghlan, "Towards a Grid-Wide Intrusion Detection System," Proc. European Grid Conf. (EGC 05), Springer, 2005, pp. 275–284.
3. G. Feng et al., "GHIDS: Defending Computational Grids against Misusing of Shared Resource," Proc. Asia-Pacific Conf. Services Computing (APSCC 06), IEEE CS Press, 2006, pp. 526–533.
4. M. Tolba et al., "Distributed Intrusion Detection System for Computational Grids," Proc. 2nd Int'l Conf. Intelligent Computing and Information Systems (ICICIS 05), 2005.
5. A. Schulter et al., "Intrusion Detection for Computational Grids," Proc. 2nd Int'l Conf. New Technologies, Mobility, and Security, IEEE Press, 2008, pp. 1–5.

Index Terms:
Intrusion detection systems, IDS, grid computing, cloud computing, information technology, security & privacy
Citation:
Kleber Vieira, Alexandre Schulter, Carlos Westphall, Carla Westphall, "Intrusion Detection for Grid and Cloud Computing," IT Professional, vol. 12, no. 4, pp. 38-43, July-Aug. 2010, doi:10.1109/MITP.2009.89
Usage of this product signifies your acceptance of the Terms of Use.