Distributed anomaly detection algorithm based on joint classifier

被引:0
作者
Zhao, Yang [1 ]
Liu, Jiqiang [1 ]
机构
[1] School of Computer and Information Technology, Beijing Jiaotong University, Beijing
来源
Journal of Computational Information Systems | 2015年 / 11卷 / 14期
关键词
Cloud Computing Attack; Fuzzy K-means; IDS;
D O I
10.12733/jcis14087
中图分类号
学科分类号
摘要
Cloud computing resources access modes as well as its collaborative computing characteristics are conducive to intrusion, and it makes cloud computing security issues more worrying, especially in largescale cloud computing environment. In contrast to previous methods, our approach introduces a cloud computing intrusion detection system based on joint classifier, and makes improvement to the security of cloud computing platform. There are three main aspects. 1) Traffic flow monitoring method, 2) Flow feature selection technique, 3) Joint classification algorithm. Furthermore, our approach has two important features. First, we use feature selection technique to find out all possible combinations of the attributes from the data set, and pick out a set of attributes with the best prediction accuracy. Second, this multi-level intrusion detection method combines with K-means and Bayesian Belief Network, and it can comprehensive cascade defects of single algorithm, and make all the indicators of results more balance, to achieve an ideal result generally. According to our evaluation result, our approach can improve the detection efficiency and real-time monitor in cloud computing platform. And our multi-level algorithm is better than the single K-means and Bayesian Belief algorithm, especially in the precision rate and the overall accuracy. ©, 2015, Journal of Computational Information Systems. All right reserved.
引用
收藏
页码:4951 / 4963
页数:12
相关论文
共 22 条
[1]  
Hubbard D., Sutton M., Top Threats to Cloud Computing V1.0, Cloud Security Alliance, (2010)
[2]  
Scheidell M., Intrusion detection system, Google Patents, (2009)
[3]  
Yu D., Frincke D., A novel framework for alert correlation and understanding, Applied Cryptography and Network Security, (2004)
[4]  
Armbrust M., Fox A., Griffith R., A view of cloud computing, Communications of the ACM, 53, pp. 50-58, (2010)
[5]  
Jensen M.M., Schwenk J., Gruschka N., On technical security issues in cloud computing: Cloud Computing, (2009)
[6]  
Bhardwaj S., Jain L., Jain S., Cloud computing: A study of infrastructure as a service (IAAS), International Journal of engineering and information Technology, 2, pp. 60-63, (2010)
[7]  
Zissis D., Lekkas D., Addressing cloud computing security issues, Future Generation Computer Systems, 28, pp. 583-592, (2012)
[8]  
Ren K., Wang C., Wang Q., Security challenges for the public cloud, Internet Computing, IEEE, 16, pp. 69-73, (2012)
[9]  
Liu H., A new form of DOS attack in a cloud and its avoidance mechanism, Proceedings of the 2010 ACM workshop on Cloud computing security workshop, (2010)
[10]  
Ristenpart T., Tromer E., Shacham H., Exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM conference on Computer and communications security, (2009)