Cloud computing is an emerging computing paradigm which introduces novel opportunities to establish large scale, flexible computing infrastructures. However, security underpins extensive adoption of Cloud computing. This paper presents efforts to address one of the significant issues with respect to security of Clouds i.e. intrusion detection and severity analysis. An abstract model for integrated intrusion detection and severity analysis for Clouds is proposed to facilitate minimal intrusion response time while preserving the overall security of the Cloud infrastructures. In order to assess the effectiveness of the proposed model, detailed architectural evaluation using Architectural Trade-off Analysis Model (ATAM) is used. A set of recommendations which can be used as a set of best practice guidelines while implementing the proposed architecture is discussed.<\/p>","DOI":"10.4018\/ijcac.2011010101","type":"journal-article","created":{"date-parts":[[2011,10,19]],"date-time":"2011-10-19T16:07:05Z","timestamp":1319040425000},"page":"1-16","source":"Crossref","is-referenced-by-count":8,"title":["An Abstract Model for Integrated Intrusion Detection and Severity Analysis for Clouds"],"prefix":"10.4018","volume":"1","author":[{"given":"Junaid","family":"Arshad","sequence":"first","affiliation":[{"name":"University of Leeds, UK"}]},{"given":"Paul","family":"Townend","sequence":"additional","affiliation":[{"name":"University of Leeds, UK"}]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Leeds, UK"}]}],"member":"2432","reference":[{"key":"ijcac.2011010101-0","unstructured":"Arshad, J. (2009). Integrated intrusion detection and diagnosis for clouds. Paper presented at the 39th Annual IEEE International Conference on Dependable Systems and Networks, Lisbon, Portugal."},{"key":"ijcac.2011010101-1","doi-asserted-by":"crossref","unstructured":"Arshad, J., & Townend, P. (2009). Quantification of security for compute intensive workloads in clouds. In Proceedings of the 15th International Conference on Parallel and Distributed Systems (pp. 479-486). Washington, DC: IEEE Computer Society.","DOI":"10.1109\/ICPADS.2009.46"},{"key":"ijcac.2011010101-2","unstructured":"Arshad, J., Townend, P., & Xu, J. (2010a). An automatic approach to intrusion detection and diagnosis for clouds. International Journal of Automation and Computing."},{"key":"ijcac.2011010101-3","doi-asserted-by":"crossref","unstructured":"Arshad, J., Townend, P., & Xu, J. (2010b). An intrusion diagnosis perspective to cloud computing. International Journal of Automation and Computing.","DOI":"10.1007\/978-0-85729-439-5_11"},{"key":"ijcac.2011010101-4","unstructured":"Arshad, J., Townend, P., Xu, J., & Jie, W. (2010). Cloud computing security: Opportunities and pitfalls. International Journal of Cluster Computing."},{"key":"ijcac.2011010101-5","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00080-3"},{"key":"ijcac.2011010101-6","unstructured":"Burchard, L., Hovestadt, M., Kao, O., Keller, A., & Linnert, B. (2004). The virtual resource manager: An architecture for SLA-aware resource management. In Proceedings of the IEEE International Symposium on Cluster Computing and the Grid (pp. 126-133). Washington, DC: IEEE Computer Society."},{"key":"ijcac.2011010101-7","unstructured":"Garfinkel, T., & Rosenblum, M. (2005). When virtual is harder than real: Security challenges in virtual machine based computing environments. In Proceedings of the 10th Workshop on Hot Topics in Operating Systems (p. 20)."},{"key":"ijcac.2011010101-8","unstructured":"GoGrid. (2010). Scalable load-balanced windows and linux cloud-server hosting. Retrieved from http:\/\/www.gogrid.com\/"},{"key":"ijcac.2011010101-9","doi-asserted-by":"crossref","unstructured":"Huai, J., Li, Q., & Hu, C. (2007). CIVIC: A hypervisor based computing environment. In Proceedings of the International Conference on Parallel Processing Workshops (p. 51).","DOI":"10.1109\/ICPPW.2007.28"},{"key":"ijcac.2011010101-10","doi-asserted-by":"crossref","unstructured":"Kazman, R., Klein, M., Barbacci, M., Longstaff, T., Lipson, H., & Carriere, J. (1998). The architecture tradeoff analysis method (Tech. Rep. No. CMU\/SEI-98-TR-008 ESC-TR-98-008). Pittsburgh, PA: Carnegie Mellon Software Engineering Institute.","DOI":"10.21236\/ADA350761"},{"key":"ijcac.2011010101-11","unstructured":"Lassing, N., Rijsenbrij, D., & Vliet, H. V. (1999). On software architecture analysis of flexibility, complexity of changes: Size isn't everything. In Proceedings of the 2nd Nordic Software Architecture Workshop (pp. 1103-1581)."},{"key":"ijcac.2011010101-12","doi-asserted-by":"crossref","unstructured":"Laureano, M., Maziero, C., & Jamhour, E. (2004). Intrusion detection in virtual machine environments. In Proceedings of the 30th IEEE EUROMICRO Conference (pp. 520-525). Washington, DC: IEEE Computer Society.","DOI":"10.1109\/EURMIC.2004.1333416"},{"key":"ijcac.2011010101-13","unstructured":"Litty, L. (2005). Hypervisor-based intrusion detection. Unpublished doctoral dissertation, University of Toronto, ON, Canada."},{"key":"ijcac.2011010101-14","doi-asserted-by":"crossref","unstructured":"Raza, A., & Abbas, H. (2008). Security evaluation of software architectures using ATAM. Paper presented at the IPID ICT4D PG Symposium, Joensuu, Finland.","DOI":"10.1109\/ICICT.2009.5267185"},{"key":"ijcac.2011010101-15","unstructured":"Roy, B., & Graham, T. C. (2008). Methods for evaluating software architecture: A survey (Tech. Rep. No. 2008-545). Kingston, ON, Canada: Queen's University."},{"issue":"1-2","key":"ijcac.2011010101-16","first-page":"169","article-title":"A taxonomy of intrusion response systems.","volume":"1","author":"N.Stakhanova","year":"2007","journal-title":"International Journal of Information Security"},{"key":"ijcac.2011010101-17","unstructured":"Tekinerdogan, B. (2004). ASAAM: Aspectual software architecture analysis method. In Proceedings of the Fourth Working IEEE\/IFIP Conference on Software Architecture (pp. 5-14). Washington, DC: IEEE Computer Society."}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=53139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:55:10Z","timestamp":1654131310000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcac.2011010101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2011010101","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}