Abstract
From the day cloud computing got its popularity, security and performance is the two important issues faced by the cloud service providers and the clients. Since cloud computing is a virtual pool of resources provided in an open environment (Internet), identifying intrusion of unauthorized users is one of the greatest challenges of the cloud service providers and cloud users. The artificial intelligence technique has been proposed in this paper in order to identify the intrusion of unauthorized user in a cloud environment. Application or research on cloud computing is always primarily focused upon any one of the issues. In our paper, the proposed algorithm satisfies the security aspects of cloud computing and the performance testing of the implementation satisfies the performance issues of cloud computing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)
Zarrabi, A., Zarrabi, A.: Internet intrusion detection system service in a cloud. Int. J. Comput. Sci. 9(1), 308 (2012)
Kandukuri, B.R., Paturi, R.V., Rakshit, A.: Cloud security issues. In: 2009 IEEE International Conference on Services Computing, Bangalore, 21–25 September 2009
Jabez, J., Muthukumar, B.: Intrusion detection system: time probability method and hyperbolic hopfield neural network. J. Theor. Appl. Inf. Technol. 67(1), 65–77 (2014)
Rajendran, P.K., Muthukumar, B., Nagarajan, G.: Hybrid intrusion detection system for private cloud: a systematic approach. Procedia Comput. Sci 48, 325–329 (2015)
Sundaram, A.: An introduction to intrusion detection. Crossroads 2(4), 3–7 (1996)
Patel, A., Taghavi, M., Bakhtiyari, K., Júnior, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36(1), 25–41 (2013)
Vieira, K., Schulter, A., Westphall, C., Westphall, C.: Intrusion detection for grid and cloud computing. It Prof. 4, 38–43 (2009)
Tupakula, U., Varadharajan, V., Akku, N.: Intrusion detection techniques for infrastructure as a service cloud. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE (2011)
Kholidy, H.A., Baiardi, F.: CIDS: a framework for intrusion detection in cloud systems. In: 2012 Ninth International Conference on Information Technology: New Generations (ITNG). IEEE (2012)
Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog computing: Mitigating insider data theft attacks in the cloud. In: 2012 IEEE Symposium on Security and Privacy Workshops (SPW). IEEE (2012)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9. IEEE (2010)
Diaz-Gomez, P.A., Dean F.H.: Misuse detection-an iterative process vs. a genetic algorithm approach. In: ICEIS, vol. 2 (2007)
Govindarajan, M., Chandrasekaran, R.M.: Intrusion detection using neural based hybrid classification methods. Comput. Netw. 55(8), 1662–1671 (2011)
Jeba, L., Rathna, M.: Improving the quality of cloud service by ensemble prediction. Int. J. Appl. Eng. Res. 9(21), 9323–9326 (2014)
Weller-Fahy, D., Borghetti, B.J., Sodemann, A.A.: A survey of distance and similarity measures used within network intrusion anomaly detection. IEEE Commun. Surv. Tutor 17(1), 70–91 (2014). doi:10.1109/COMST.2014.2336610
Bai, Y., Kobayashi, H.: Intrusion detection systems: technology and development. In: 2003 17th International of Advanced Information Networking and Applications AINA 2003, vol. 27(29), pp. 710–715, March 2003
Safa, N.S., Ghani, N.A., Ismail, M.A.: An artificial neural network classification approach for improving accuracy of customer identification in e-commerce. Malays. J. Comput. Sci. 27(3), 171–185 (2014)
Rajendran, P.K., Muthukumar, B.: Hybrid intrusion detection algorithm for private cloud. WSEAS Trans. Comput. (2015, Accepted)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
B., M., Rajendran, P.K. (2015). Intelligent Intrusion Detection System for Private Cloud Environment. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-MartÃnez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-22915-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22914-0
Online ISBN: 978-3-319-22915-7
eBook Packages: Computer ScienceComputer Science (R0)