A New Neural Network-Based IDS for Cloud Computing

  • Priyanka Joshi
  • Ritu Prasad
  • Pradeep Mewada
  • Praneet Saurabh
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 710)

Abstract

Services provided by cloud computing are the very fascinating as it offers of free access or paid access to the buyers. This paradigm facilitates a verity of facets to the users. Being such an interesting concept and having so many beneficial features, the cloud also suffers from several security risks. This results in creating a lot of challenges at the time of implementation. Since, cloud services are not confined to limited boundaries therefore chances of misadventure leading to compromise is immense. Intrusion detection system (IDS) within the cloud environment is an interesting idea and this paper presents “A neural network-based intrusion detection system for cloud computing (NN-IDS)”. It discusses the various integrated methods that provide detection in cloud environment and also takes prevention measures for the malignant functions found within the cloud. Experimental results show that NN-IDS performs much better than existing work and shows significant improvement in accuracy and precision.

Keywords

Intrusion Intrusion detection Cloud computing Identity-based encryption 

References

  1. 1.
    Arshad, J., Townsend, P. and Xu, J.: A novel intrusion severity analysis approach for Clouds. Future Generation Computer Systems, 29 (2013) 416–428.Google Scholar
  2. 2.
    Casola, V., Cuomo, A., Rak, M. and Villano, U.: The Cloud Grid approach-Security analysis and performance evaluation. Future Generation Computer Systems, 29 (2013) 387–401.Google Scholar
  3. 3.
    Chen, D., and Zhao, H.: Data Security and Privacy Protection Issues in Cloud Computing. International Conference on Computer Science and Electronics Engineering (2012) 647–651.Google Scholar
  4. 4.
    Han, J., Susilo, W. and Mu, Y.: Identity-based data storage in cloud computing. Future Generation Computer Systems, 29 (2013) 673–681.Google Scholar
  5. 5.
    Yin, X.Z., Liu, H.: An Efficient and Secured Data Storage Scheme in Cloud Computing Using ECC-based PKI. IEEE 16th International Conference on Advanced Communication Technology (ICACT) (2014) 523–527.Google Scholar
  6. 6.
    Yang, C.: Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing. International Symposium on Biometrics and Security Technologies (ISBAST) (2013) 259–266.Google Scholar
  7. 7.
    Alzain, M.A., Soh, B. & Pardede, E.: A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds, Journal of Software, Vol. 8 No. 5 (2013).Google Scholar
  8. 8.
    Mohod, A.G., Alaspurkar, S.J.: Analysis of IDS for Cloud Computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 2, Issue 3 (2013) 344–349.Google Scholar
  9. 9.
    Van, R.: Comparison of Network Intrusion Detection Systems in cloud computing environment. Computer Communication and Informatics (ICCCI), International Conference on 10–12 Jan. (2012).Google Scholar
  10. 10.
    Parag, K., Gawande, A. D.: Intrusion Detection System for Cloud Computing. International Journal of Scientific & Technology Research Volume 1, Issue 4, ISSN 2277–8616, (2012).Google Scholar
  11. 11.
    Sondhiya, R., Shreevastav, M.: To Improve Security in Cloud Computing with Intrusion detection system using Neural Network. International Journal of Soft Computing and Engineering (IJSCE), Volume-3, Issue-2 (2013).Google Scholar
  12. 12.
    Mathew, S.: Securing Cloud from Attacks based on Intrusion Detection System. International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 10, (2012).Google Scholar
  13. 13.
    Gupta, S.: IDS Based Defense for Cloud Based Mobile Infrastructure as a Service. IEEE Eighth World Congress on Services (2012).Google Scholar
  14. 14.
    Vaishali, B.: Intrusion Detection System in Cloud Computing: An Overview. International Journal on Recent and Innovation Trends in Computing and Communication, Volume: 4 Issue: 1 (2016).Google Scholar
  15. 15.
    Kresimir, P., Zeljko H.: Cloud computing security issues and challenges. MIPRO Proceedings of the 33rd International Convention (2010) 344–349.Google Scholar
  16. 16.
    Bhel, A.: Emerging Security Challenges in Cloud Computing. Information and Communication Technologies, World Congress on, Mumbai (2011) 217–222.Google Scholar
  17. 17.
    Mishti, D.: Intrusion Detection System for DoS Attack in Cloud. International Journal of Applied Information Systems (IJAIS), Volume 10, No. 5 (2016).Google Scholar
  18. 18.
    Patil, D.: To Implement Intrusion Detection System for Cloud Computing Using Genetic Algorithm. International Journal of Computer Science and Information Technology Research, Vol. 3, Issue 1 (2015).Google Scholar
  19. 19.
    Nassif, A.B., Danny Ho b, Capretz, L.F.: Towards an early software estimation using log-linear regression and a multilayer perceptron model. Journal of Systems and Software, 86 (2013) 144–160.Google Scholar
  20. 20.
    Sabahi, F.: Cloud Computing Security Threats and Responses. IEEE 3rd International Conference on Communication software and Networks (ICCSN) (2011) 245–249.Google Scholar
  21. 21.
    Mohamed, E.M., Abdelkader, H.S., Etriby, S. EI.: Enhanced Data Security Model for Cloud Computing. 8th International Conference on Informatics and Systems (INFOS), Cairo, (2012) 12.Google Scholar
  22. 22.
    Liu, W.: Research on Cloud Computing Security Problem and Strategy. 2nd International Conference on Consumer Electronics. Communications and Networks (CECNet) (2012) 1216–1219.Google Scholar
  23. 23.
    Mathisen, E.: Security Challenges and Solutions in Cloud Computing. International Conference on Digital Ecosystems and Technologies (IEEE DEST) (2011) 208–212.Google Scholar
  24. 24.
    Saurabh, P., Verma, B.: An Efficient Proactive Artificial Immune System based Anomaly Detection and Prevention System. Expert Systems with Applications, Elsevier, 60 (2016) 311–320.Google Scholar
  25. 25.
    Saurabh, P., Verma, B.: Cooperative Negative Selection Algorithm. International Journal of Computer Applications (0975–8887), vol 95, Number 17 (2014) 27–32.Google Scholar
  26. 26.
    Saurabh, P., Verma, B, Sharma, S.: An Immunity Inspired Anomaly Detection System: A General Framework. Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012), vol 202 of the series Advances in Intelligent Systems and Computing, Springer (2012) 417–428.Google Scholar
  27. 27.
    Saurabh, P., Verma, B, Sharma, S.: Biologically Inspired Computer Security System: The Way Ahead, Recent Trends in Computer Networks and Distributed Systems Security the Way Ahead. Recent Trends in Computer Networks and Distributed Systems Security, Communications in Computer and Information Science, Springer, vol 335 (2011) 474–484.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Priyanka Joshi
    • 1
  • Ritu Prasad
    • 1
  • Pradeep Mewada
    • 1
  • Praneet Saurabh
    • 2
  1. 1.Department of Information Technology and EngineeringTechnocrats Institute of Technology (Excellence)BhopalIndia
  2. 2.Department of Computer Science and EngineeringTechnocrats Institute of TechnologyBhopalIndia

Personalised recommendations