Implementation of Artificial Intelligence forIDS in Cloud Data Centers

Cloud computing provides large scale computing resource to each customers. Cloud systems can be threatened by numerous attacks as cloud provides services to no trustworthy system. As the speedy usage of personal computer system and computer network in business organization and government organization are Bringing up day by day, the computer network is the mass medium over which attacks are put together. It comes final result in completely destroyed, unauthorized utilization and modifies in private data and demeans the reliability of computer network. To providing protection in computer network Artificial intelligence has latterly contributed intrusion detection system. This paper presents intrusion detection system which automatically updates the suspicious activity of cloud users therefore whenever new user try to access the data or try to use cloud it will compare with the log database which is present at administrator side

[1]  D. Theng,et al.  VM Management for Cross-Cloud Computing Environment , 2012, 2012 International Conference on Communication Systems and Network Technologies.

[2]  Sanjay Ram Effective Analysis of Cloud Based Intrusion Detection System , 2012 .

[3]  Snehal G. Kene,et al.  A review on intrusion detection techniques for cloud computing and security challenges , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).

[4]  Peng Zhang,et al.  Collaborative network security in multi-tenant data center for cloud computing , 2014 .

[5]  Ueman Oktay,et al.  Proxy Network Intrusion Detection System for cloud computing , 2013, 2013 The International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE).

[6]  M SanjayRam,et al.  Effective Analysis of Cloud Based Intrusion Detection System , 2012 .

[7]  Shefali Singh,et al.  Intrusion Detection Based On Artificial Intelligence Techniques , 2014 .

[8]  P. Praveen Kumar,et al.  A Survey on Cloud Based Intrusion Detection System , 2013 .

[9]  Vanish Talwar,et al.  Ranking anomalies in data centers , 2012, 2012 IEEE Network Operations and Management Symposium.

[10]  Peter Mell,et al.  Intrusion Detection Systems , 2001 .

[11]  Wu Yang,et al.  An Efficient Intrusion Detection Model Based on Fast Inductive Learning , 2007, 2007 International Conference on Machine Learning and Cybernetics.