Advertisement

Security Analysis in Cloud Environment

  • M. S. Akshay
  • Ashina Kakkar
  • K. Jayasree
  • P. Prudhvi
  • Prathibha Shridhara Metgal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 324)

Abstract

Cloud computing is a new environment similar to distributed systems and is limited to its use of networking. Therefore, security issues are prevalent and cannot be ignored. Intrusion detection systems (IDS) are used to detect malicious behavior in network communication and hosts in real time. An open-source IDS widely in use is Snort, powerful IDS that can be configured by writing simple rules to detect a wide variety of hostile or suspicious network traffic. But IDS alone cannot effectively analyze the security threats as they have high rates of false alerts. Several machine learning and neural network algorithms have been tested on available datasets, and it has been proved that these algorithms help reduce false alerts up to a large extent. In this paper, we propose a way to bridge the gap between intrusion detection system benchmarking and real-world attacks by making use of effective and efficient algorithms.

Keywords

Cloud Intrusion detection system Cloud fusion unit Snort Genetic algorithm AdaBoost Self-organizing map Assessment units Decision units Virtual machines 

References

  1. 1.
    A. Zarrabi, A. Zarrabi, Internet intrusion detection system service in a cloud. Int. J. Comput. Sci. 9(5) (2012) Google Scholar
  2. 2.
    S. Mukkamala, G .Janoski, A. Sung, Intrusion detection using neural networks and support vector machines. IEEE-IJCNN (2002)Google Scholar
  3. 3.
    A. Singh, M. Shrivastava, Overview of attacks on cloud computing. Int. J. Eng. Innovative Technol. 1(4) (2012)Google Scholar
  4. 4.
    M. Roesch, Snort-lightweight intrusion detection for network, in Proceedings of Lisa ’99 (1999)Google Scholar
  5. 5.
    R. Sondhiya, M. Shreevastav, M. Mishra, To improve security in cloud computing with intrusion detection system using neural network. Int. J. Soft Comput. Eng. 3(2) (2013)Google Scholar
  6. 6.
    K. Patel, R. Srivastava, Classification of cloud data using bayesian classification. Int. J. Sci .Res. 2(6) (2013)Google Scholar
  7. 7.
    M.D. Holtz, B.M David, R. Timoteo, Building scalable distributed intrusion detection systems based on map reduce framework. Revista Telecommun. 1 (2011)Google Scholar
  8. 8.
    H.G. Kayacık, N. Zincir-Heywood, Analysis of three intrusion detection system benchmark dataset using machine learning algorithm. Int. J. Eng. Innovative Technol. (2009)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • M. S. Akshay
    • 1
  • Ashina Kakkar
    • 1
  • K. Jayasree
    • 1
  • P. Prudhvi
    • 1
  • Prathibha Shridhara Metgal
    • 1
  1. 1.Department of IT, Amrita School of EngineeringAmrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations