Abstract

INTRODUCTION: Cloud computing offers on-demand services, from which consumers can avail networked storage and computer resources. Due to the fact that cloud is accessed through internet, its data are prone to internal and external intrusions. Cloud Intrusion Detection System will now be able to classify each pattern of testing dataset as either normal or intrusive and in case of intrusion, it will identify the type of intrusion. By comparing each of these actual results with the expected results of testing dataset. It is strongly observing the inside-activities of a network. Hence, it is suitable for detecting intrusions in cloud environment. OBJECTIVES: Hybrid Cloud Intrusion Detection System can function well for a very huge dataset and it can also detect unknown attacks. To achieve the better performance in the cloud setting by utilizing this Cloud Intrusion Detection System. METHODS: To overcome performance issues, Principal Component Analysis and Network Behaviour Analysis are proposed. RESULTS: The experimental and performance assessment show that the proposed model is well planned, efficient and effective in finding cloud environment intrusions. An Intrusion Detection System (IDS) monitors all incoming and outgoing network activity to identifies any signs of intrusion in your system that could compromise your systems. CONCLUSION: Experiments are performed using a standard benchmark KDD-cup dataset and the findings are addressed. IDS helps the Network Administrator to track down bad guys on the Internet whose very purpose is to bring you r network to a breach point and make it vulnerable to attacks.

Highlights

  • Cloud computing offers on-demand services, from which consumers can avail networked storage and computer resources

  • A cloud intrusion detection system is embedded with the proposed framework to monitor all activities happening within the cloud services

  • An intrusion detection scheme is proposed for secure cloud setting

Read more

Summary

Introduction

Cloud computing offers on-demand services, from which consumers can avail networked storage and computer resources. By comparing each of these actual results with the expected results of testing dataset It is strongly observing the inside-activities of a network. It is suitable for detecting intrusions in cloud environment. The security threats of remote cloud data centres have not yet been clearly identified It is often regarded as a difficult challenge to establish an effective technique to achieve developed by adopting a combination of soft computing approaches. Once the training is complete, the Cloud Intrusion Detection System will be able to identify any unknown cloud protection with optimum accuracy.

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.