Cloud Intrusion Detection System Based on SVM

被引:2
作者
Alheeti K.M.A. [1 ]
Lateef A.A.A. [2 ]
Alzahrani A. [3 ]
Imran A. [4 ]
Al Dosary D. [1 ]
机构
[1] Computer Networking Systems Department, University of Anbar, Anbar
[2] Human Resources Department, University of Anbar, Anbar
[3] Computer Engineering and Science Department, Al Baha University, Al Baha
[4] Department of Creative Technologies, Air University, Islamabad
关键词
Cloud computing; detection system; Machine Learning; network intrusion detection; normal and abnormal behaviors; SVM;
D O I
10.3991/ijim.v17i11.39063
中图分类号
学科分类号
摘要
The demand for better intrusion detection and prevention solutions has elevated due to the current global uptick in hacking and computer network attacks. The Intrusion Detection System (IDS) is essential for spotting network attacks and anomalies, which have increased in size and scope. A detection system has become an effective security method that monitors and investigates security in cloud computing. However, several existing methods have faced issues such as low classification accuracy, high false positive rates, and low true positive rates. To solve these problems, a detection system based on Support Vector Machine (SVM) is proposed in this paper. In this method, the SVM classifier is utilized for network data classification into normal and abnormal behaviors. The Cloud Intrusion Detection Dataset is used to test the effectiveness of the suggested system. The experimental results show which the suggested system can detect abnormal behaviors with high accuracy. © 2023, International Journal of Interactive Mobile Technologies. All Rights Reserved.
引用
收藏
页码:101 / 114
页数:13
相关论文
共 12 条
[1]  
Quick Rich, 5 Reasons Enterprises Are Frightened of the Cloud, (2013)
[2]  
Mehmood Yasir, Shibli Muhammad Awais, Habiba Umme, Masood Rahat, Intrusion Detection System in Cloud Computing: Challenges and opportunities, 2013 2nd National Conference on Information Assurance (NCIA), pp. 59-66, (2013)
[3]  
Dhage Sudhir N., Meshram B.b., Intrusion detection system in cloud computing environment, International Journal of Cloud Computing, 1, 2-3, pp. 261-282, (2012)
[4]  
IDG Enterprise Cloud Research. Cloud Computing Key Trends and Future Effects, (2013)
[5]  
Chatzigiannakis V., Androulidakis G., Grammatikou M., Maglaris B., A Distributed Intrusion Detection Prototype Using Security Agents, Workshop of the HP OpenView University Association, (2004)
[6]  
Zhou Chenfeng Vincent, Leckie Christopher, Karunasekera Shanika, A survey of coordinated attacks and collaborative intrusion detection, Computers and Security, 29, 1, pp. 124-140, (2010)
[7]  
Teng S. H., A Study on Object-Monitoring-based Distributed and Collaborative Intrusion Detection, (2008)
[8]  
Ostermann Simon, Iosup Alexandru, Yigitbasi Nezih, Prodan Radu, Fahringer Thomas, Epema Dick, An Early Performance Analysis of Cloud Computing Services for Scientific Computing, (2008)
[9]  
Smith Clifton L., Brooks David J., The Theory and Practice of Security, (2013)
[10]  
Messmer Ellen, Cloud Security Alliance formed to promote best practices | computerworld