Professional Documents
Culture Documents
Intrusion Detection Techniques For Mobile Cloud Computing in Heterogeneous 5g
Intrusion Detection Techniques For Mobile Cloud Computing in Heterogeneous 5g
Abstract — As the importance of distributed The paper shows safety concerns in MCC and
computers is rapidly growing, they are becoming combines latest attainments all together in intrusion
the target of more and more crime. Intrusion may detection abilities so that the approaches can be
be defined as the set of attempts to compromise found which can successfully deploy the rise in
computer network security. Besides the several heterogeneous 5G. As Intrusion Detection System
security services, Intrusion Detection (IDS) is a vital authority that has been related with
System/Techniques are taken into point that various techniques. As each technique has different
strengthen the system security and is more property therefore each observation process has both
powerful in preventing internal and external prevalence and restrictions. The major benefactions
attacks. This technique is considered to be very of this paper are bifold:
efficient in preventing wireless communication in It allocates 5G users of future and
Fifth Generation. In this paper we will discuss developers with an analytical efficient
what Mobile Cloud Computing is and various model to attain safe data communication.
Intrusion Detection Techniques for mobile
computing along with challenges faced by each It analysis and integrates all critical safety
technique. concerns in MCC from a technical aspect.
103
Volume 11, Issue 1 ∙January-June 2020
defined as any software that makes itself
available on internet and uses a standardized
1. MOBILE COMPUTING messaging system known as XML. It can also
To enable devices that are portable, to access the be defined as consolidation of web
services available on the web, a platform known as applications by using Simple Object Access
Mobile Computing is developed that is supported by
wireless networks. It is a technology in which Protocol, Extensible Markup Language, Web
without being connected to a fixed physical link, we Services Description Language and Universal
can transmit data, video and voice via any wireless Description, Discovery and Integration. The
device. It involves the following: security criteria and requirements may vary
a. Mobile Hardware: To receive and access in mobile internet. Therefore, they often
the service of mobility, Mobile devices or address service layer objects such as
components comes in this category such as, application, platform and infrastructure layer.
tablet PCs, portable laptops, smartphones, It doesn’t matter which layer is choose,
etc. These devices are capable of sending wireless network itself always faces threats
and receiving signals at the same time. from intrusion.
b. Mobile Communication: To ensure that
seamless and reliable communication goes 3. BEHIND CLOUD COMPUTING
on, mobile communication is an Cloud computing have some technologies
infrastructure that is put in place for the that are similar to the deployments or service
same. For example, services, portal, types[10,11].Basically, there are three
protocols and bandwidth necessary to technologies that are adopting the cloud
support the services. It ensures that the computing with the Mass Distributed
other systems that offers the same service, Storage(MDS) virtualization and the
does not collide. technology that are under the Parallel
c. Mobile Software: It is the actual program Programming Model(PPM)[12-15].Cloud
that runs on the mobile hardware. It is the computing used service deployment
operating system of appliance. It deals with technology that are provided by
the demands and characteristics of mobile virtualization. The main advantages of the
applications. It is the most essential virtualization was that distributing the
component used to operate mobile devices. resources among multiple levels of
It is useful in reducing application’s service[16,17] with the help of object
development time. When communication takes virtualization that are network, storage, data,
place, it also faces threats. For example, one of physical machine and servers[18].If the levels
the threats is when using virtual private of service are explained only then the virtual
network, the wireless communication can be machine are capable of delivering the
easily invaded because of interconnection of services of the system to the end users.
various networks. Authentication and Virtual machine also capable for describing
encryption methods are used for security in the information in a proper way and represent
mobile computing for virtual private network the resources in a set of entities that are logic-
access. related for the end-users [19-21]. Virtual
machine provide some application that are
2. MOBILE INTERNET isolated in nature to the end-users with the
The method of accessing browser based functionality of the virtualized system and
Internet services from mobile devices, such that application are running on the operating
as smartphones, through wireless networks is system. By using the Virtual machine the cost
referred to as mobile internet. It is a of resources are reduced for the end-users,
technology derived from development of saved the usage of energy and provide the
wireless networks. Some recent technologies easiest path for the maintenances of
that are active, includes: Third Generation system[22-24].The main function of Virtual
(3G), Mobile Commerce (M-commerce), machine are independent in nature and
WiFi and long term evolution. The future provided the isolated platform to the users
asset for mobile internet is 5G. The central system component and protect the
idea of mobile internet is to connect two information of users from the
communicators that support Web services, attackers[25,26].Attackers provided the
via wireless network. Web services may be controls of the Virtual machine in the context
105
Volume 11, Issue 1 ∙January-June 2020
Some requirements that the IDS follow to fulfill its detection(PHAD) and second technique
tasks include completeness, accuracy, performance, called network traffic anomaly
timeliness and fault tolerance. detection(NETAD)[46].The limitations of
IDS is classified into 5 categories: these two technique are prevented by using
a. Detection based on Anomaly (ABD) the two components of detection such as
b. Detection based on Signatures (SBD) misuse and anomaly. These two major
c. Hybrid Intrusion Detection components are designed by using the
random forest algorithm [47]. These two
d. Stateful Protocol Analysis Detection
techniques are designed on the bases of IDS
(SPAD) which are used for the open sources
e. Detection based on Specifications (SPBD) assignment[48].The main aim of hybrid
intrusion technique to increase the accuracy
of the detection and decreasing the
A. DETECTION METHODOLOGIES complexity of the network system[49].The
hybrid intrusion detection technique are also
This part includes the description of techniques, used for enhancing the performance of the
concepts, limitations and deployments of various wireless network and designed the
IDSs including ABD, SBD, hybrid intrusion hierarchical structure of network[50].The
detection, SPAD and SPBD approaches. main drawback of the hybrid intrusion
detection was that in these it is difficult to
1. SIGNATURE BASED DETECTION AND combine the different types of detection
APPROACH techniques. In these multiple techniques are
This technique is also known as Misuse come to perform the tasks at the same time
Detection. It depends on the known patterns that’s why the workload of the packets are
of unauthorized behavior [35]. It comprises increase.
of storing the signature profiles that identifies
patterns that are associated with network 3. ANOMALY-BASED DETECTION AND
intrusions in signature database and generates APPROACH
some rules that are based on signature This system is an intrusion detection system
profiles. The data packets that are transmitted which helps in detecting both network as well
on the network with their corresponding as computer intrusions and misapply by
classification rules are classified on the basis monitoring system activity and categorizing
of these generated rules. The intrusion it normal or anomalous. The categorization is
patterns or strings on the database that are based on rules instead of signatures or
pre-installed, SDB depends on that. If SDB patterns, and trying to identify any kind
system is not updated, the signatures will not misapply that comes from normal system
be detected that results in decrease of its operation. The ABD system represents an
performance. Since the intrusions are approach of recognizing obvious separation
dynamic, the IDS using SBD may not or unpredictability in the events and
identify new threats when connected to transmissions [51, 52-54]. The collation if
internet. This problem can be solved by there is any separation in the usual and
deploying an automated signature creator that unfamiliar deportment and this unfamiliar
is attached to this system [36, 37]. By deportment is observed to be dynamic or
collecting and analyzing the constituents of possible assault, which rely on the amount
consistent behaviors, these signature creators distinctness. There are three major techniques
can be generated [38, 39]. But this solution sustaining collations which contain
has also a limitation that the latest algorithms mathematical-based [55], fact-based, and
cannot completely detect all malicious machine knowledge-based techniques
instances. Due to the excess load of packets [56,57].
on network, the performance is deducted Mathematical-based (also referred as
when the processing capability cannot match statistical-based) technique: This technique
the wireless transmission ability [40]. This route each and every traffics and creates a
can be solved if the data storage and description which analyzes if there might any
processing can be moved to cloud and by kind of inappropriate traffic by a
examining the parallel signature matching on mathematical examination [58]. The
cloud based servers [41]. problems for implementing mathematical-
based technique are bifold. First, placing an
2. HYBRID INTRUSION DETECTION actual stability between good or bad
Different types of intrusion depend on the deportment is difficult. Second, if the system
security that are requested by the users is being assaulted this technique may get
[42,43,44,45].This type of intrusion detection failed.
are the combination of the two techniques Fact-based technique: It is a kind of computer
that are called packet header anomaly program that make use of knowledge base to
107
Volume 11, Issue 1 ∙January-June 2020
3. Kumar K, Lu Y. Cloud computing for Physics Procedia. Elsevier: Beijing, China,
mobile users: can offloading computation 2012.
save energy? Computer 2010. 16. Messaoud E HB, Diouri O. Web service
4. Shiraz M, Gani A, Khokhar RH, Buyya R. security: overview, analysis and challenges.
A review on distributed application International Journal of Computer Science
processing frameworks in smart mobile Issues 2014.
devices for mobile cloud computing. 17. Ma Z, Sheng Z, Gu L. DVM: a big virtual
5. Miettinen AP, Nurminen JK. Energy machine for cloud computing. IEEE
efficiency of mobile clients in cloud Transactions on Computers 2013.
computing, Proceedings of the 2nd 18. Zhang S, Yan H, Chen X. Research on key
USENIX Workshop on Hot Topics in technologies of cloud computing. In
Cloud Computing, Boston, MA, 2010. Physics Procedia. Elsevier: Beijing, China,
6. Simoens P, Turck FD, Dhoedt B, 2012.
Demeester P. Remote display solutions for 19. Ma Z, Sheng Z, Gu L. DVM: a big virtual
mobile cloud computing. IEEE Internet machine for cloud computing. IEEE
Computing 2011. Transactions on Computers 2013.
7. Qiu M, Su H, Chen M, Ming Z, Yang LT. 20. Luo Y. Network I/O virtualization for cloud
Balance of security strength and energy for computing. IT Professional Magazine 2010.
a PMU monitoring system in smart grid. 21. Chaudhary D, Chhillar RS. Reverse host
IEEE Communications Magazine 2012. allocation approach for virtual machine
8. Qiu M, Gao W, Chen M, Niu J, Zhang L. cloud computing environment. International
Energy efficient security algorithm for Journal of Computer Applications 2013.
power grid wide area monitoring system. 22. Langer SG, French T. Virtual machine
IEEE Transactions on Smart Grid 2011. performance benchmarking. Journal of
9. Qiu M, Zhang L, Ming Z, Chen Z, Qin X, Digital Imaging 2011.
Yang LT. Security-aware optimization for 23. Bright PP, Bijolin EE. Energy efficient
ubiquitous computing systems with SEAT virtual machine monitoring architecture for
graph approach. Journal of Computer and green cloud computing. International
System Sciences 2013. Journal of Computer Applications 2013.
10. Hu F, Qiu M, Li J, Grant T, Taylor D, 24. Lovsz G, Niedermeier F, Meer HD.
McCaleb S, et al. A review on cloud Performance tradeoffs of energy-aware
computing: design challenges in virtual machine consolidation. Cluster
architecture and security. Journal of Computing 2013.
Computing and Information Technology 25. Zhang F, Chen H. Security-preserving live
2011. migration of virtual machine in the cloud.
11. Gai K, Li S. Towards cloud computing: a Journal of Network and Systems
literature review on cloud computing and Management 2013.
its development trends, 2012 Fourth 26. Wang Z, Liu M, Zhang S, Qiu M. Sensor
International Conference on Multimedia virtualization for underwater event
Information Networking and Security, detection. Journal of Systems Architecture
Nanjing, China, 2012; 142–146. IEEE. 2014.
12. Marozzo F, Talia D, Trunfio P. P2P- 27. Modi C, Patel D, Borisaniya B, Patel H. A
MapReduce: parallel data processing in survey of instrusion detection techniques in
dynamic cloud environments. Journal of cloud. Journal of Network and Computer
Computer and System Sciences 2012. Applications 2013.
13. Masdari M, Zebardast B, Lotfi Y. Towards 28. Liao H, Lin CR, Lin Y, Tung K. Intrusion
virtualization in cloud computing. detection system: a comprehensive review.
International Journal of Advanced Research Journal of Network and Computer
in Computer Science 2013. Applications 2013.
14. Wang Y, Sun W, Zhou S, Pei X, Li X. Key 29. Lin Q, Qi Z, Wu J, Dong Y, Guan H.
technologies of distributed storage for Optimizing virtual machines using hybrid
cloud computing. Journal of Software 2012. virtualization. Journal of Systems and
15. Zhang S, Yan H, Chen X. Research on key Software 2012.
technologies of cloud computing. In 30. Gani A, Nayeem GM, Shiraz M, Sookhak
M, Whaiduzzaman M, Khan S. A review on
109
Volume 11, Issue 1 ∙January-June 2020
Applications Conference Workshops 62. Whitman ME, Mattord HJ. Principles of
(COMPSACW), IEEE, Japan, 2013. Information Security, 4th edn. Information
55. Chora M, Saganowski L, Renk R, Security Professionals: Boston, MA, 2009
Houbowicz W. Statistical and signal based 63. Frederick KK. Network intrusion detection
network traffic recognition for anomaly signatures, part five, Symantec, November
detection. Expert Systems 2012. 2010
56. George A. Anomaly detection based on http://www.symantec.com/connect/articles/
machine learning: dimensionality reduction network-intrusion-detection-signatures-
using PCA and classification part-five [Accessed on December 2014].
57. using SVM. International Journal of 64. Teh PS, Teoh A BJ, Yue S. A survey of
Computer Applications 2012. keystroke dynamics biometrics. The
58. Wagh SK, Pachghare VK, Kolhe SR. Scientific World Journal 2013.
Survey on intrusion detection system using 65. Bhattacharyya D, Ranjan R, Alisherov FA,
machine learning techniques.International Choi M. Biometric authentication: a
Journal of Computer Applications 2013. review. International Journal of U- and E-
59. Kheyri D, Karami M. A comprehensive Service, Science andTechnology 2009.
survey on anomaly-based intrusion 66. Babaeizadeh M, Bakhtiari M, Maarof MA.
detection in MANET. Computer and Keystroke dynamic authentication in
Information Science 2012. mobile cloud computing.International
60. Stakhanova N, Basu S, Wong J. On the Journal of Computer Applicatios 2014.
symbiosis of specification-based and 67. Frank M, Biedert R, Ma E, Martinovic I,
anomaly-based detection. Computer & Song D. Touchalytics: on the applicability
Security 2010 of touchscreen input as a behavioral
61. Stakhanova N, Basu S, Wong J. On the biometric for continuous authentication.
symbiosis of specification-based and IEEE Transactions on Information
anomaly-based detection.Computer & Forensics and Security 2014.
Security 2010.