Anomaly-based IDS Implementation in Cloud Environment using BOAT Algorithm

被引:0
作者
Vaid, Chetna [1 ]
Verma, Harsh K. [1 ]
机构
[1] Dr BR Ambedkar Natl Inst Technol, Dept Comp Sci & Engn, Jalandhar, India
来源
2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS) | 2014年
关键词
Cloud computing; centralized resources; security; intrusion detection; anomaly-detection; data mining; BOAT algorithm;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Innovations are essential to ride the inevitable tide of revolutions. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has led to the innovation of cloud computing. With the increasing number of companies resorting to employ resources in the cloud, the protection of the users' data is becoming a significant issue of concern. This report tackles this concern for enterprises in terms of security with intrusion detection while adopting cloud computing. The main aim of this research is to understand the security threats and identify a security technique used to mitigate them in cloud computing. The intrusion detection will be undertaken on the basis of anomaly-detection on the data generated from the transactions captured within the cloud network. The data captured will undergo intense data mining through clustering and then performing classification using BOAT algorithm to detect the presence of intruders on the cloud. The mining approach will consider various attributes of the data to scrutinize the user behaviour.
引用
收藏
页数:6
相关论文
共 31 条
[1]  
[Anonymous], INSIDER THREATS CLOU
[2]  
Binu M. S., 2012, INDIAN J COMPUTER SC, V3, P548
[3]   CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms [J].
Calheiros, Rodrigo N. ;
Ranjan, Rajiv ;
Beloglazov, Anton ;
De Rose, Cesar A. F. ;
Buyya, Rajkumar .
SOFTWARE-PRACTICE & EXPERIENCE, 2011, 41 (01) :23-50
[4]  
Chang-Lung Tsai, 2010, Proceedings of the 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM 2010), P645
[5]   IDSIC: an intrusion detection system with identification capability [J].
Chen, Pei-Te ;
Laih, Chi-Sung .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (03) :185-197
[6]  
Choudhury AJ., 2011, IEEE Asia-Pacific Services Computing Conference, P110, DOI DOI 10.1109/APSCC.2011.14
[7]  
Day D. J., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P931, DOI 10.1109/TrustCom.2012.110
[8]   Security issues in cloud environments: a survey [J].
Fernandes, Diogo A. B. ;
Soares, Liliana F. B. ;
Gomes, Joao V. ;
Freire, Mario M. ;
Inacio, Pedro R. M. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) :113-170
[9]  
Gautam Ajeet Kumar, 2012, INT J COMPUTER APPL, V53, P1
[10]  
Gehrke J, 1999, SIGMOD RECORD, VOL 28, NO 2 - JUNE 1999, P169, DOI 10.1145/304181.304197