Cyber Attack Detection Framework for Cloud Computing

To prevent cyber-attacks, cloud-based systems mainly depend upon different types of intrusion detection systems (IDS). Most of the approaches have high detection rate for known attacks. But in case of unknown attacks or new attacks, these intrusion detection system increases false alarm rate. Another problem is that the reduction of false alarm rate increases the computational complexities in case of genetic algorithm-based IDS and ANN-based IDS. For instance, to tackle challenges like zero-day attack, the only way is to rely upon a robust data-driven approach for security in cloud. Actually in cloud huge amount of data are processed for various activities. It is very difficult to correlate events over such huge amount of data. To improve the abilities of monitoring and fast decision-making, context management is used for correlating events and inferring contexts and evidences. In this paper, a new data-driven framework has been proposed which utilizes ontology and knowledge base to detect cyber-attack with intrusion detection system in cloud.

[1]  Glenn Shafer,et al.  A Mathematical Theory of Evidence turns 40 , 2016, Int. J. Approx. Reason..

[2]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.

[3]  Sang-Soo Yeo,et al.  A novel method for SQL injection attack detection based on removing SQL query attribute values , 2012, Math. Comput. Model..

[4]  Qihui Wu,et al.  A survey of machine learning for big data processing , 2016, EURASIP Journal on Advances in Signal Processing.

[5]  John W. Lockwood,et al.  Deep packet inspection using parallel Bloom filters , 2003, 11th Symposium on High Performance Interconnects, 2003. Proceedings..

[6]  V. Jaiganesh,et al.  Intrusion Detection Systems: A Survey and Analysis of Classification Techniques , 2013 .

[7]  Andrei Vladyko,et al.  A fuzzy logic-based information security management for software-defined networks , 2014, 16th International Conference on Advanced Communication Technology.

[8]  Sheng-Hsun Hsu,et al.  Application of SVM and ANN for intrusion detection , 2005, Comput. Oper. Res..