Implementation of Hybrid Approach for Intrusion Detection in Cloud Computing Environment

Authors(1) :-Preeti Chourasiya

Cloud computing is a very fast growing technology that offer novel service to the Information Technology domain. With the help of cloud computing will reduce the infrastructure maintenance cost. The probability of having numerous types of vulnerabilities beginning attacks is high. In this paper we study and analysis dissimilar approach of an intrusion detection system that has been utilize to counter malicious attacks in Cloud computing environment. In this paper we implementation of hybrid approach for intrusion detection in cloud computing environment. The proposed approach based on ANN with fuzzy logic based Hybrid IDS, to which is additional proficient than the traditional IDS (Intrusion Detection System).

Authors and Affiliations

Preeti Chourasiya
Department of Information Technology, PCETs Pimpri Chinchwad College of Engineering, Pune, Maharashtra, India

Cloud Computing, IDS, ANN, fuzzy logic, DoS, DDoS.

  1. A. A. Shaikh, H. Qi, W. Jiang and M. Tahir, "A novel HIDS and log collection based system for digital forensics in cloud environment," 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, 2017, pp. 1434-1438. doi: 10.1109/CompComm.2017.8322779
  2. Luan Huy Pham, M. Albanese and S. Venkatesan, "A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud," 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, 2016, pp. 489-497. doi: 10.1109/CNS.2016.7860540
  3. Q. Xia, T. Chen and W. Xu, "CIDS: Adapting Legacy Intrusion Detection Systems to the Cloud with Hybrid Sampling," 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, 2016, pp. 508-515. doi: 10.1109/CIT.2016.31
  4. Y. Mehmood, M. A. Shibli, A. Kanwal and R. Masood, "Distributed intrusion detection system using mobile agents in cloud computing environment," 2015 Conference on Information Assurance and Cyber Security (CIACS), Rawalpindi, 2015, pp. 1-8. doi: 10.1109/CIACS.2015.7395559.
  5. Aborujilah and S. Musa, "Critical review of intrusion detection systems in cloud computing environment," 2016 International Conference on Information and Communication Technology (ICICTM), Kuala Lumpur, 2016, pp. 251-255. doi: 10.1109/ICICTM.2016.7890809
  6. X. Zhao and W. Zhang, "An Anomaly Intrusion Detection Method Based on Improved K-Means of Cloud Computing," 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), Harbin, 2016, pp. 284-288. doi: 10.1109/IMCCC.2016.108.
  7. H. Hammami, H. Brahmi and S. Ben Yahia, "Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systems," 2018 International Conference on Information Networking (ICOIN), Chiang Mai, 2018, pp. 174-181. doi: 10.1109/ICOIN.2018.8343106
  8. Z. Chiba, N. Abghour, K. Moussaid, A. El Omri and M. Rida, "A survey of intrusion detection systems for cloud computing environment," 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, 2016, pp. 1-13. doi: 10.1109/ICEMIS.2016.7745295
  9. X. Zhao and W. Zhang, "Hybrid Intrusion Detection Method Based on Improved Bisecting K-Means in Cloud Computing," 2016 13th Web Information Systems and Applications Conference (WISA), Wuhan, 2016, pp. 225-230. doi: 10.1109/WISA.2016.
  10. H. C. Liu, X. N. Hou, Z. Yang, “Design of Intrusion Detection System Based on Improved Kmeans Algorithm,” Comput. Technol. Dev., vol.26, no.1, Jan.2016. [22] S. Harifi, E. Byagowi, and M. Khalilian, “Comparative Study of Apache Spark MLlib Clustering Algorithms,” In Proc. Int. Conf. Data Min. Big Data, pp.61-73, Jul.27-Aug.1, 2017.
  11. M. K. Siddiqui, S. Naahid, “Analysis of KDDCUP 99 dataset using clustering based data mining,” Int. J. Data Theory Appl., vol.6, no.5, pp. 23-34, June.2013.
  12. S. Madan, K. J. Dana, “Modified balanced iterative reducing and clustering using hierarchies (m-BIRCH) for visual clustering,” Pattern Anal. Appl., vol.19, no.4, pp.1023-1040, Nov.1, 2016.

Publication Details

Published in : Volume 3 | Issue 8 | November-December 2018
Date of Publication : 2018-12-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 233-237
Manuscript Number : CSEIT183878
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Preeti Chourasiya , "Implementation of Hybrid Approach for Intrusion Detection in Cloud Computing Environment", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.233-237, November-December-2018. Available at doi : https://doi.org/10.32628/CSEIT183878
Journal URL : https://res.ijsrcseit.com/CSEIT183878 Citation Detection and Elimination     |      |          | BibTeX | RIS | CSV

Article Preview