Computer Science Project Topics

Multi-level Intrusion Detection and Log Management System in Cloud Computing

Multi-level Intrusion Detection and Log Management System in Cloud Computing

Multi-level Intrusion Detection and Log Management System in Cloud Computing

CHAPTER ONE

Objective of the study

  1. To increase resource availability of Cloud Computing system.
  2. To handle the potential threats by deploying Multi-level IDS and managing user logs per group according to anomaly level.
  3. To develop an address book application that will be launch as a cloud application.

CHAPTER TWO

LITERATURE REVIEW

INTRODUCTION

This chapter is concern with the review of related literatures,  the contribution of other researchers is examined in this chapter. It looks at:

  • Cloud computing overview
  • Cloud components
  • Services
  • Applications
  • First Movers in the Cloud
  • Your Organization and Cloud Computing
  • Intrusion Detection Systems
  • What Intrusion Detection Systems and Related Technologies Can and Cannot Do

 CLOUD COMPUTING OVERVIEW

In this first section, we’ll talk about what cloud computing is, and how it is developed and deployed. We’ll clear up some misconceptions and make sure we all have a common understanding of the topic.

Cloud computing gets its name as a metaphor for the Internet. Typically, the Internet is represented in network diagrams as a cloud. The cloud icon represents “all that other stuff” that makes the network work. It’s kind of like “etc.” for the rest of the solution map. It also typically means an area of the diagram or solution that is someone else’s concern, so why diagram it all out? It’s probably this notion that is most applicable to the cloud computing concept. Cloud computing promises to cut operational and capital costs and, more importantly, let IT departments focus on strategic projects instead of keeping the data centre running.

 

CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

Introduction

This chapter takes an overviews on the system design and the entire research work, it is important to note that a poorly designed system will equally produce an incorrect output as such this chapter presents a skeletal approach to the design of the entire system.

CHAPTER FOUR

SYSTEM IMPLEMENTATION AND DOCUMENTATION

Introduction

This chapter presents the system flow chart, analysis of modules, choice of programming language and programming environment.

CHAPTER FIVE

Introduction

This chapter focuses on summary, conclusion and recommendations.

Here, the entire summary of the research from the problem stage to the implementation stage, the relevant conclusion and recommendations are discussed.

Constraints of the Study

The problems encountered during the course of carrying out this research project include:

  1. Time: Time for the research project was too short coupled with researcher’s academic time table.
  2. Fund:There was limited fund to take care of the research properly in terms of transportation and other expenses especially when visiting attraction sites.
  3. Research Materials: Lack of access to research materials on the topic in the polytechnic library and even public libraries were also major constraint in the cause of this project.

Summary

Multi-level IDS and log management method is based on consumer behaviour for applying IDS effectively to the cloud system. They assign a risk level to user behaviour based on analysis of their behaviour over time. By applying differentiated levels of security strength to users based on the degree of anomaly increases the effective usage of resources. Their method proposes the classification of generated logs by anomaly level. This is so that the system administrator analyses logs of the most suspected users first. Also the data traffic in the cloud is minimized and security is enhanced.

Conclusion

Cloud Computing technology provides human toadvantages such as economical cost reduction andeffective resource management. However, if securityaccidents occur, ruinous economic damages are inevitable.Our project proposed Multi-level IDS for effective resourceand log management. Proposed method provides how wedecrease the rule-set size of IDS and manages users’ logs.

Recommendations

Having designed, tested and implemented the new system, the following must be put in place to fully achieve the objective of which the software is designed.

  1. Maintenance: The system needs to be maintained. This implies that any fault detected should be reported to the programmer for correction at any point in time.
  2. Steady Internet Connection: The system needs to be connected to the internet before the user can access the features of the software.
  3. Research: More research should be conducted on the topic to assess it effectively.

REFERENCES

  • Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing, Dec. 2009
  • Enisa, Cloud Computing Risk Assessment, Nov. 2009
  • JaeHyuk Jang, Cisco, Cloud Computing: Drive Business Paradigm Shift, 2010.
  • Kento S, Hitoshi. S, Satoshi. M, “A Model-based Algorithm for Optimizing I/O Intensive Applicationsin Clouds using VM-Based Migration”, 9th IEEE/ACM International Symposium, Cluster Computing and Grid, 2009.
  • Gruschka and M. Jensen, “Attack Surface: A Taxonomy for Attacks on Cloud Services,” IEEE 3rd International Conference on Cloud Computing, pp. 276-279, 2010.
  • Rebecca Bace and Peter Mell, NIST Special Publication on Intrusion Detection Systems, 16 Aug. 2001.
  • Roberto Di Pietro and Luigi V. Mancini, Intrusion Detection Systems, Springer, Jan. 2008.
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!