First, this case study explores an Intrusion Detection System package called Snort (provided by Cisco Systems) in a cloud environment. Snort is an open source and highly scalable signature-based intrusion detection system. Here, Snort is deployed on Ubuntu Server 16.0.4 running on a virtual machine within a Microsoft Azure cloud system. This paper provides details on installing Snort on the virtual machine and configuring it for intrusion detection. The architecture here is based on a VM integrated IDS on Azure and demonstrates how a VM instance in the cloud can be secured through an IDS. Firewalls may be considered the first line of defense but they fail to secure systems from inside attacks. Next, two other areas (where Snort is less widely used) are briefly explored, namely library systems and mobile devices. Finally, this paper makes further recommendations on how a cloud network can be secured by distributed placement of the IDS and on each VM instances.
翻译:首先,本案例研究探索了云层环境中称为Snott(由思科系统提供)的入侵探测系统包件。 Snott是一个开放源码和高度可扩缩的信号入侵探测系统。在这里,Snort部署在微软Azure云系统内的Ubuntu服务器上16.0.4,运行在微软Azure云系统中的虚拟机器上。本文详细介绍了在虚拟机器上安装Snort并将其配置为入侵探测。本文建筑基于Azure上的VM集成 IDS, 并展示如何通过IDS来保证云层中的VM实例的安全。 防火墙可被视为第一防线,但无法保护系统不受内部攻击。 下一步,将简要探讨另外两个区域(Snort使用较少的地方), 即图书馆系统和移动设备。 最后,本文进一步建议如何通过分散地放置 IDS 和每个VM 实例来保护云层网络的安全。