Browsing by Author "Norbik Bashah Idris"
Now showing 1 - 4 of 4
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism(International Journal of Communication Networks and Information Security (IJCNIS), 2017) ;Azuan Ahmad ;Norbik Bashah IdrisMohd Nazri KamaCloud Computing Security is a new era of computer technology and opens a new research area and creates a lot of opportunity of exploration. One of the new implementation in Cloud is Intrusion Detection System (IDS).There are problems with existing IDS approach in Cloud environment. Implementing traditional IDS need a lot of self-maintenance and did not scale with the customer security requirements. In addition, maintenance of traditional IDS in Cloud Computing system requires expertise and consumes more time where not each Cloud user has. A decentralized traditional IDS approach where being deployed in current Cloud Computing infrastructure will make the IDS management become complicated. Each user's IDS will not be the same in term of type and configurations and each user may have outdated signatures. Inter VM's communication also become a big concern when we implementing Cloud Computing system where communication between Clouds are not monitored and controlled by the traditional IDS. A specific IDS model for Cloud computing is required to solve these problems. In this paper, we develop a prototype of Cloud IDS inspired by Dendritic Cell mechanism. Experiment result proved that Cloud IDS was able to detect any attempt to attack the Cloud environment. The experiments show that the Cloud IDS model based on Dendritic Cell algorithm able to identify and detect novel threat that targeting Cloud environment. - Some of the metrics are blocked by yourconsent settings
Publication Security Risk Assessment Framework For Cloud Computing Environments(John Wiley & Sons, Ltd., 2014) ;Sameer Hasan Albakri ;Bharanidharan Shanmugam ;Ganthan Narayana Samy ;Norbik Bashah IdrisAzuan AhmadCloud computing has become today's most common technology buzzword. Despite the promises of cloud computing to decrease computing implementation costs and deliver computing as a service, which allows clients to pay only for what they need and use, cloud computing also raises many security concerns. Most popular risk assessment standards, such as ISO27005, NIST SP800-30, and AS/NZS 4360, assume that an organization's assets are fully managed by the organization itself and that all security management processes are imposed by the organization. These assumptions, however, do not apply to cloud computing environments. Hence, this paper proposes a security risk assessment framework that can enable cloud service providers to assess security risks in the cloud computing environment and allow cloud clients to contribute in risk assessment. The proposed framework provides a more realistic and accurate risk assessment outcome by considering the cloud clients' evaluation of security risk factors and avoiding the complexity that can result from the involvement of clients in whole risk assessment process. - Some of the metrics are blocked by yourconsent settings
Publication State Of The Art Intrusion Detection System For Cloud Computing(International Journal of Communication Networks and Information Security, 2018) ;Azuan Ahmad ;Wan Shafiuddin Zainudin ;Mohd Nazri Kama ;Norbik Bashah Idris ;Madihah Mohd SaudiNur Hafiza ZakariaThe term Cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today Cloud computing not only provides innovative improvements in resource utilisation but it also creates a new opportunities in data protection mechanisms where the advancement of intrusion detection technologies are blooming rapidly. From the perspective of security, Cloud computing also introduces concerns about data protection and intrusion detection mechanism. This paper surveys, explores and informs researchers about the latest developed Cloud Intrusion Detection Systems by providing a comprehensive taxonomy and investigating possible solutions to detect intrusions in cloud computing systems. As a result, we provide a comprehensive review of Cloud Intrusion Detection System research, while highlighting the specific properties of Cloud Intrusion Detection System. We also present taxonomy on the key issues in Cloud Intrusion Detection System area and discuss the different approaches taken to solve the issues. We conclude the paper with a critical analysis of challenges that have not fully solved. - Some of the metrics are blocked by yourconsent settings
Publication Traditional Security Risk Assessment Methods In Cloud Computing Environment: Usability Analysis(Penerbit UTM Press, 2015) ;Sameer Hasan Albakri ;Bharanidharan Shanmugam ;Ganthan Narayana Samy ;Norbik Bashah IdrisAzuan AhmedThe term "Cloud Computing" has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of the cloud computing model, several security concerns have been raised and many other security threats have been needed to be reevaluated according to the cloud structure. Besides, the traditional security risk assessment methods become unfit for cloud computing model due to its new distinguished characteristics. In this paper, we analysis the traditional information security risk assessment methods' ability to assess the security risks in cloud computing environments.