0% found this document useful (0 votes)
13 views

Security Model Using Intrusion Detection System on Cloud Computing Security Management

Uploaded by

yudhiwb
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Security Model Using Intrusion Detection System on Cloud Computing Security Management

Uploaded by

yudhiwb
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Security Model using Intrusion Detection

System on Cloud Computing Security Management


Muhammad Agreindra Helmiawan Irfan Fadil
Department of Informatics Engineering Department of Information System
STMIK Sumedang STMIK Sumedang
Sumedang, Indonesia Sumedang, Indonesia
[email protected] [email protected]

Yanyan Sofiyan 4th Esa Firmansyah


Department of Information System Department of Informatics Engineering
STMIK Sumedang STMIK Sumedang
Sumedang, Indonesia Sumedang, Indonesia
[email protected] [email protected]
2021 9th International Conference on Cyber and IT Service Management (CITSM) | 978-1-6654-3548-2/21/$31.00 ©2021 IEEE | DOI: 10.1109/CITSM52892.2021.9588810

Abstract—The use of Cloud Computing has advantages that are related to storage on the cloud itself that opposes data,
have the potential to be an extraordinary service in supporting data theft, violating the authority, and Accountable privacy-
work procedures that can be carried out anywhere via the preserving [10], [11] of the cloud system. In this case, the
internet. Through the internet, we can carry out activities cloud security architecture discusses the system being a
anywhere, but it will also cause other problems that will arise major concern in cloud computing.
because of access via the internet, one of which is from the
security side, system and security management on a computer More than the potential advantages that can be gotten
is very crucial for securing a lot of data on it. The purpose of from the distributed computing model, this model despite
this research is to provide suggestions related to security everything has many open model issues, the believability and
management in Cloud Computing, especially in the sectors of allure model. Locking, multitenancy and disconnection
Integrity, Authority, Privacy, and Confidentiality, also propose merchants, information the board, administration versatility,
the proposed Concepts and Recommendations which are machine flexibility, Service Level Agreement (SLA) the
expected to improving security for Cloud Computing security executives, and cloud security are open exploration issues
and detection intruders who break into cloud computing known in the distributed computing model, and security on
systems using Intrusion Detection System and networks using that is a significant worry [12] of the appropriation of the
Intrusion Detection System methods. Further research can be distributed computing model in light of the fact that:
implemented and performed for improving security on cloud
• Third-party companies that manage outsourcing
computing.
security
Keywords—cloud computing, security, intrusion detection • Assets in the same location from different tenants
system, security management with different security standards.
• The level of guarantee that can change in SLA’s
I. INTRODUCTION between consumers and service providers.
Some cloud computing providers have views security
Cloud Computing has the potential to be an extraordinary requires [8], [13], [14] many security licenses, security
service in supporting work procedures that can be carried out resources, and is a problem that cannot be found at the
anywhere via the internet [1]. This simple technology is outset, especially authentication and security management
ideally used by organizations to run innovative business [15]. From this perspective, security in the cloud computing
models in organizations [2]–[4] that use information model will influence consumers and find new security
technology (IT) in their work procedures and makes it easy solutions that solve the problem.
for users to move data and application to the cloud data
center. The Cloud Model has motivated organizations to This paper analyzes security issues in cloud computing
implement cloud computing for media center applications, and its strategy in securing user data according to the concept
ranging from high computing-intensive applications to and character of cloud computing. Data privacy and service
lightweight services [5], [6]. Cloud Computing is included in availability in cloud computing are the focus on security
Strategic Planning, organizations, and companies in the issues. using only one security method cannot provide a
performance process because this model helps approve sense of security and comfort in its use. Solving cloud
Information Technology (IT) without initial investment in computing security problems and many applied technologies
infrastructure, software licensing, and other related and specific strategies must be used together to protect the
requirements [5]. At the same time, cloud computing has cloud computing system completely. The proposed security
become an option in managing important files and files to be model in cloud computing and focuses on the security
accessed wherever and whenever Multitenancy and infrastructure model, intrusion detection system (IDS) on
flexibility are the two fundamental qualities of the cloud network, security management in cloud computing by
model that make it conceivable to expand the assets collecting some of the problems identified by design,
proposed to offer types of assistance that can be utilized for problems identified with the administration delivery model,
its clients. These characteristics form the main basis of problems identified with the cloud, and problems identified
Integrity, privacy, authority, and confidentiality of the Cloud with cloud interests. This study also proposes a security
Computing system [7]–[9]. Problems that arise in the cloud model in cloud computing in the form of an infrastructure

Authorized licensed use limited to: Universitas Indonesia. Downloaded on November 09,2024 at 06:07:54 UTC from IEEE Xplore. Restrictions apply.
The 9th International Conference on Cyber and IT Service Management (CITSM 2021)
Bengkulu, September 22-23, 2021

design for security and a security management framework C. Security Strategies


aimed at securing cloud computing that focuses on In the security strategy, there are at least 5 things that
authentication and user data that resides in it. need to be considered, including Business Sustainability
II. LITERATURE REVIEW Guarantee, Proactive Warning, Data Leakage Prevention,
Security Response, Security Incident Audit [24]. These five
Cloud Computing requires several methods and things become the main key in the sustainability of the
management in the transfer of data that is in the Cloud system and data security of cloud computing users so that
A. Management and Access Control users can calmly and comfortably access data and be flexible
in making use of cloud computing systems anywhere and
Character the executives and access control are required anytime safely without any security holes that can be entered
in the trustworthiness and secrecy of information and by other parties and of course all activities on cloud
administrations, a track record of the user's identity is needed computing are monitored by the user himself.
to avoid unauthorized access to stored data [16], [17]. Access
control of data owners in cloud computing and stored on Network security problems often arise that have an
different platforms. Some organizations use many different impact on disruption to cloud computing, so monitoring and
authentication authorizations. By utilizing an alternate authentication are needed for early detection that can catch
methodology, confirmation and approval give conditions that and interpret disturbances that arise in the network and cloud
are protected to a specific timeframe. Distributed computing computing. Network and server security uses a real-time
assets are dynamic and flexible for cloud clients and Internet intruder detection monitoring system and integrates it with
Protocol (IP) [18] delivers keep on changing when an authentication system as a notification medium to
administrations are begun or restarted in each utilization. administrators and sees attack history and coercion in cloud
This allows users to enter and leave features to cloud computing.
resources when they need an access policy on request. All of D. Intrusion Detection System
these features require efficient and effective access control
and identity management. Cloud computing must maintain Implementing Intrusion Detection System (IDS) in cloud
identity management updates and management quickly for computing [25], there are several procedures that are
the user activity [19]. There are numerous issues in get to implemented and configured so that IDS can work optimally
control and character the executives, for instance, feeble [26], [27]. Software requirements include a detection and
certifications can be handily reworked, locking accounts monitoring system in the event of an intrusion. In
automatically for a certain period time [20], the ability to implementing notification media in the authentication system
keep track of activity and hold attacks on Extensible Markup and integrating with the IDS system in cloud computing,
Language (XML) websites. several configurations were made to send warning
notifications through the Application Programming Interface
Threats that arise can occur from within caused by (API) [28], [29] in accordance with the warning messages for
employees, contractors, business partners of third parties [21] detection of attacks and misuse of data in cloud computing.
of an organization. On the side of the Cloud Service Provider Thus, if the IDS system detects an attack, abuse or intrusion,
(CSP), the attack causes loss of information, confidentiality, the notification and authentication system will send a real-
and user security which results in loss information or a time warning notification via the API based on the intrusion
breach in both environments. There are different examples of log.
assaults completed by insiders due to the dick get to gave by
the inner structure of the association's information III. RESULT AND DISCUSSION
stockpiling. Most associations don't know about these The proposed concept of security and infrastructure for
conditions, since it can't or is hard to locate the correct Cloud Computing is made to emphasize the security data
answer for this assault. layer stored in cloud computing. Data access and migration
Information security relies upon the framework supplier are carried out through verification and authority that can be
to get total information security. In cloud condition, known by the owner of the track record, as well as a warning
specialist can just decide security settings distantly and are system that is responsive in restoring cloud computing if
not known precisely actualized. In this procedure, framework something unexpected happens and protect data from cloud
suppliers must accomplish the objective of classification in computing system leaks.
secure information move and access and review abilities. So In Figure 1, in the proposed architectural concept, there
that outside interlopers can't get to delicate information put are 6 important points of concern in this article, including
away in the cloud. Warning System, Encryption, Encrypted/Indexed Data,
B. Selective Access Data and User Privacy Backup and Recovery, Encryption & Decryption, Key
Encrypted Indexed. Alert System, this facility [24] is for
In the selectivity of other users who access data owners, monitoring and notifying the activities carried out and
regulations are needed that can limit the access rights and changes to the user, so that if there is a suspicious activity
privacy of data [22], [23]. This is necessary so that data and changes to user access, it will be immediately notified to
leakage does not occur due to the absence of authority or the user.
data privacy that was leaked. In accessing data from outside,
reliable access, and valid authorization as a data protection Security management has a system that manages security
service are required. Access Control Lists (ACL) and Private planning that functions as long-term planning and prediction
keys are needed in cloud computing data access, privacy, and of security conditions and situations in the future. This
security monitoring. security plan is related to risk management that overcomes

Authorized licensed use limited to: Universitas Indonesia. Downloaded on November 09,2024 at 06:07:54 UTC from IEEE Xplore. Restrictions apply.
The 9th International Conference on Cyber and IT Service Management (CITSM 2021)
Bengkulu, September 22-23, 2021

and manages security risks that occur, Risk assessment also provided by users who have access rights to other users to
has a role in knowing how well the security performance is have access to the data.
based on the status report which later the results of the risk
assessment become the basis for the security control manager Cloud Computing as an IT system interacts with the
to categorize the security level in cloud computing. All internet. Users browse with web services and can access any
security history and assessments are stored in a security website, the service used when accessing the internet is an
repository which serves as a security index for security Secure Shell (SSH) and File Transfer Protocol (FTP) port,
enhancements. The IDS [25]–[27] system on authentication with this condition Cloud Computing has a high risk of
control can detect attacks, intrusions and forced logins cybersecurity threats. Cloud Computing cybersecurity to
against users, there will be notifications through monitoring watch out for includes intrusions in Cloud Computing
and provide real-time warnings and attack data can be seen systems that can be cracked by intruders and unauthorized
through logs equipped with an IDS monitoring system from parties over cloud computing, Denial of Service (DDoS)
every access to cloud computing. With this proposed model, attacks and malicious malware [31], phishing threats that can
security in cloud computing can be implemented and manipulate interfaces and steal identities in cloud computing.
improved so that data and user connections to cloud Web Service also needs to be added security with risk
computing are secure. control models including Prevention, Protection, Detection,
and Response. Of the four phases used as protection of cloud
computing web services. Prevention that can be done can be
in the form of security policies, security policy reviews,
security assessments, and regular audits. Protection that can
be done can apply a Firewall, Web Application Firewall, and
Intrusion Protection System.

Fig. 2. Overview of cloud computing infrastructure

Responses that can be done include scanning regularly


and regularly, making repairs as soon as possible in the event
of a system or data leak, blocking internet protocol, and
suspected Uniform Resource Locator (URL). Detection can
Fig. 1. Architectural Cloud Computing Security Proposed be done by analyzing network traffic and reading the cloud
computing log system.
Encryption, this facility is to encrypt the path of user
activity in accessing, creating, reading, changing and 1. Business Sustainability Guarantee, the use of Cloud
deleting data. Encrypted / Indexed Data, every user activity Computing requires continuity in a long-time scale,
in managing data which includes creating, reading, changing including countermeasures when unexpected things such
and deleting data, will be encrypted with the aim of securing as disasters that cause damage to the infrastructure of
the data [10]. The data is made into an index, to facilitate Cloud Computing that have an impact on the obstruction
users in processing and accessing data. of an organization's business processes. Recovery also
needs to be planned as a temporary migration measure to
Backup and Recovery, this facility aims to backup and support cloud computing with measurable recovery time.
recover in case of a malfunction of the cloud system, backup
and recovery is also encrypted with the aim that if the data 2. Proactive Warning, real-time warnings are needed to alert
backup leaks, it cannot be opened by other than the user. stakeholder organizations that use cloud computing.
Decryption here is provided with authentication that only the Unauthorized users can enter cloud computing systems,
data user has. As long as the user uses data, Backup recovery hosts, physical infrastructure, computer networks in
and Encryption Decryption continue and function, this is Cloud Computing. Therefore, monitoring cloud
aimed at securing data during the data access process, so that computing systems is very necessary for the disruption
the risk of data theft cannot occur [12][30]. Key Encrypted that can be resolved precisely and quickly.
Indexed, archive and share data using keys as authentication 3. Data Leakage Prevention, the most significant and
hazardous dangers are information spillage in distributed

Authorized licensed use limited to: Universitas Indonesia. Downloaded on November 09,2024 at 06:07:54 UTC from IEEE Xplore. Restrictions apply.
The 9th International Conference on Cyber and IT Service Management (CITSM 2021)
Bengkulu, September 22-23, 2021

computing frameworks, two things that can conceivably [4] D. Yuniarto, M. Suryadi, E. Firmansyah, D. Herdiana, and A. B. A.
prompt static and dynamic spillage. Static spillage Rahman, “Integrating the Readiness and Usability Models for
Assessing the Information System Use,” in 2018 6th International
implies that information put away in server farms, Conference on Cyber and IT Service Management (CITSM), 2018, pp.
application memory, and terminal memory is gotten to 1–6.
and spilled by unapproved clients, while dynamic [5] F. Shimba, “Cloud computing: Strategies for cloud computing
spillage implies that information adjusted in the cloud adoption,” 2010.
condition is gotten to and spilled by capturing client [6] M. A. Helmiawan and I. Fadil, “PRIVATE CLOUD STORAGE IN
records or tapping system channels. These two kinds of RURAL’S MANAGEMENT AND INFORMATION SYSTEM
spillage have normally gotten extraordinary consideration USING ROADMAP FOR CLOUD COMPUTING ADOPTION
(ROCCA),” Intern. (Information Syst. Journal), vol. 2, no. 2, pp.
and are paid attention to. 172–183, 2019.
4. Security Responses, security incidents that occur in cloud [7] S. Sengupta, V. Kaulgud, and V. S. Sharma, “Cloud Computing
computing, there must be a notification to cloud Security--Trends and Research Directions,” no. May 2014, pp. 524–
531, 2011.
computing users. These emergencies must be overcome
[8] A. A. Che Fauzi, A. Noraziah, T. Herawan, and N. Mohd. Zin, “On
by responding to incidents with recovery at the system, cloud computing security issues,” Lect. Notes Comput. Sci. (including
infrastructure, cloud backup, and firewall levels. The Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol.
incident must already be in the cloud computing security 7197 LNAI, no. PART 2, pp. 560–569, 2012.
standard. [9] Y. Fauziah, “Tinjauan Keamanan Sistem Pada Teknologi Cloud
Computing,” J. Inform. Ahmad Dahlan, vol. 8, no. 1, 2014.
5. Security Incident Audit, to prevent security incidents that [10] H. Cheng, C. Rong, M. Qian, and W. Wang, “Accountable privacy-
have occurred, previous incidents are audited and studied preserving mechanism for cloud computing based on identity-based
what can keep the cloud computing system running and encryption,” IEEE Access, vol. 6, pp. 37869–37882, 2018.
can be used by users. [11] S. Dewi, “Konsep Perlindungan Hukum Atas Privasi Dan Data
Pribadi Dikaitkan Dengan Penggunaan Cloud Computing Di
Other security problems include resource allocation and Indonesia,” DEMO 2 J., no. 94, 2016.
de-allocation related to virtual machines. Unexpected [12] W. Liu, “Research on cloud computing security problem and
leakage, for example in the memory log, can occur if the strategy,” 2012 2nd Int. Conf. Consum. Electron. Commun. Networks,
memory allocated to the virtual machine is not deleted in CECNet 2012 - Proc., pp. 1216–1219, 2012.
accordance with the procedure before it is reallocated to [13] S. Carlin and K. Curran, “Cloud computing security,” Int. J. Ambient
another virtual machine. Other problems can occur with Comput. Intell., vol. 3, no. 1, pp. 14–19, 2011.
communication, monitoring, modification, and migration of [14] M. A. AlZain, E. Pardede, B. Soh, and J. A. Thom, “Cloud computing
virtual machines. With the characteristics of multi-tenant security: From single to multi-clouds,” Proc. Annu. Hawaii Int. Conf.
Syst. Sci., pp. 5490–5499, 2012.
cloud computing, if it is not fully correct in the isolation and
[15] M. Almorsy, J. Grundy, and A. S. Ibrahim, “Collaboration-based
placement of virtual resources when used by users it will also cloud computing security management framework,” Proc. - 2011
cause problems that occur in cloud computing systems. IEEE 4th Int. Conf. Cloud Comput. CLOUD 2011, pp. 364–371,
2011.
IV. CONCLUSION [16] I. Ghafir, V. Prenosil, J. Svoboda, and M. Hammoudeh, “A survey on
With the concept of architecture and infrastructure network security monitoring systems,” in 2016 IEEE 4th
International Conference on Future Internet of Things and Cloud
created, it can be used as a reference in securing data in Workshops (FiCloudW), 2016, pp. 77–82.
cloud computing so that data leakage does not occur by
[17] M. A. Helmiawan, D. I. Juna, and B. Ramdhani, “Pengamanan Sistem
irresponsible parties. The core of this cloud computing Dan Data E-Voting Berbasis Network,” Intern. (Information Syst.
security includes security management and access control Journal), vol. 1, no. 1, pp. 1–10, 2018.
that is done by using encryption in every user activity. [18] N. Sultana, N. Chilamkurti, W. Peng, and R. Alhadad, “Survey on
Selection of user access and privacy with a key and security SDN based network intrusion detection system using machine
on the web service. Implementation of strategies insecurity is learning approaches,” Peer-to-Peer Netw. Appl., vol. 12, no. 2, pp.
also important in securing cloud computing by ensuring the 493–501, 2019.
continuity of the cloud system, proactive warnings to users, [19] N. Khan and A. Al-Yasiri, “Framework for cloud computing
adoption: A road map for Smes to cloud migration,” arXiv Prepr.
preventing data leakage by auditing the system regularly and arXiv1601.01608, 2016.
providing notifications before and after the incident, and [20] I. M. Khalil, A. Khreishah, and M. Azeem, “Cloud computing
being responsive in responding to incidents and quickly security: A survey,” Computers, vol. 3, no. 1, pp. 1–35, 2014.
recovering them as well as right. Further research can be [21] G. Kulkarni, J. Gambhir, T. Patil, and A. Dongare, “A security
implemented and performed for improving security on cloud aspects in cloud computing,” ICSESS 2012 - Proc. 2012 IEEE 3rd Int.
computing. Conf. Softw. Eng. Serv. Sci., no. June 2012, pp. 547–550, 2012.
[22] E. Firmansyah et al., “Examining readiness of e-learning
REFERENCES implementation using Aydin and Tasci model: A rural university case
study in Indonesia,” AIP Conf. Proc., vol. 2331, 2021.
[1] J. Dizdarević, F. Carpio, A. Jukan, and X. Masip-Bruin, “A survey of
communication protocols for internet of things and related challenges [23] D. Yuniarto, M. Helmiawan, D. Junaedi, A. Saeppani, and Y.
of fog and cloud computing integration,” ACM Comput. Surv., vol. Sopiyan, “Factors Affecting the Use of Information Systems in
51, no. 6, pp. 1–29, 2019. Hybrid Models,” 2020.
[2] V. Sagan et al., Monitoring inland water quality using remote [24] M. A. Helmiawan, E. Firmansyah, I. Fadil, Y. Sofivan, F. Mahardika,
sensing: potential and limitations of spectral indices, bio-optical and A. Guntara, “Analysis of Web Security Using Open Web
simulations, machine learning, and cloud computing, vol. 205. 2020. Application Security Project 10,” in 2020 8th International
Conference on Cyber and IT Service Management (CITSM), 2020, pp.
[3] S. J. Putra, A. Subiyakto, I. Yunita, M. N. Gunawan, and Y.
1–5.
Durachman, “Assessing the user satisfaction perspectives of
information system: A library case study in Indonesia,” Indones. J. [25] D. Avison, G. Fitzgerald, and P. Powell, “Private Cloud Storage in
Electr. Eng. Comput. Sci., vol. 12, no. 1, pp. 95–101, 2018. Rural’S Management and Information System Using Roadmap for

Authorized licensed use limited to: Universitas Indonesia. Downloaded on November 09,2024 at 06:07:54 UTC from IEEE Xplore. Restrictions apply.
The 9th International Conference on Cyber and IT Service Management (CITSM 2021)
Bengkulu, September 22-23, 2021

Cloud Computing Adoption (Rocca),” Inf. Syst. J., vol. 17, no. 3, pp. [29] T. G. Nguyen, T. V Phan, B. T. Nguyen, C. So-In, Z. A. Baig, and S.
215–216, 2007. Sanguanpong, “Search: A collaborative and intelligent nids
[26] D. Ageyev, L. Kirichenko, T. Radivilova, M. Tawalbeh, and O. architecture for sdn-based cloud iot networks,” IEEE access, vol. 7,
Baranovskyi, “Method of self-similar load balancing in network pp. 107678–107694, 2019.
intrusion detection system,” 2018 28th Int. Conf. Radioelektronika, [30] J. T. Mościcki and M. Lamanna, “Prototyping a file sharing and
RADIOELEKTRONIKA 2018, no. 2, pp. 1–4, 2018. synchronization service with Owncloud,” in Journal of Physics:
[27] O. Al-Jarrah and A. Arafat, “Network Intrusion Detection System Conference Series, 2014, vol. 513, no. 4, p. 42034.
Using Neural Network Classification of Attack Behavior,” J. Adv. Inf. [31] A. Abdollahi and M. Fathi, “An Intrusion Detection System on Ping
Technol., vol. 6, no. 1, pp. 1–8, 2015. of Death Attacks in IoT Networks,” Wirel. Pers. Commun., vol. 112,
[28] E. Hodo et al., “Threat analysis of IoT networks using artificial neural no. 4, pp. 2057–2070, 2020.
network intrusion detection system,” 2016 Int. Symp. Networks,
Comput. Commun. ISNCC 2016, pp. 4–8, 2016.

Authorized licensed use limited to: Universitas Indonesia. Downloaded on November 09,2024 at 06:07:54 UTC from IEEE Xplore. Restrictions apply.

You might also like