A New Neural Network-Based IDS for Cloud Computing

Services provided by cloud computing are the very fascinating as it offers of free access or paid access to the buyers. This paradigm facilitates a verity of facets to the users. Being such an interesting concept and having so many beneficial features, the cloud also suffers from several security risks. This results in creating a lot of challenges at the time of implementation. Since, cloud services are not confined to limited boundaries therefore chances of misadventure leading to compromise is immense. Intrusion detection system (IDS) within the cloud environment is an interesting idea and this paper presents “A neural network-based intrusion detection system for cloud computing (NN-IDS)”. It discusses the various integrated methods that provide detection in cloud environment and also takes prevention measures for the malignant functions found within the cloud. Experimental results show that NN-IDS performs much better than existing work and shows significant improvement in accuracy and precision.

[1]  Hoon Jae Lee,et al.  An efficient and secured data storage scheme in cloud computing using ECC-based PKI , 2014, 16th International Conference on Advanced Communication Technology.

[2]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[3]  Eric Pardede,et al.  A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds , 2013, J. Softw..

[4]  Bhupendra Verma,et al.  An Immunity Inspired Anomaly Detection System: A General Framework , 2012, BIC-TA.

[5]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[6]  A. D. Gawande,et al.  INTRUSION DETECTION SYSTEM FOR CLOUD COMPUTING , 2012 .

[7]  Valentina Casola,et al.  The CloudGrid approach: Security analysis and performance evaluation , 2013, Future Gener. Comput. Syst..

[8]  Danny Ho,et al.  Towards an early software estimation using log-linear regression and a multilayer perceptron model , 2013, J. Syst. Softw..

[9]  Bhupendra Verma,et al.  An efficient proactive artificial immune system based anomaly detection and prevention system , 2016, Expert Syst. Appl..

[10]  E. M. Mohamed,et al.  Enhanced data security model for cloud computing , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).

[11]  Anjali Sardana,et al.  IDS Based Defense for Cloud Based Mobile Infrastructure as a Service , 2012, 2012 IEEE Eighth World Congress on Services.

[12]  Ching-Nung Yang,et al.  Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing , 2013, 2013 International Symposium on Biometrics and Security Technologies.

[13]  R. Vanathi,et al.  Comparison of Network Intrusion Detection Systems in cloud computing environment , 2012, 2012 International Conference on Computer Communication and Informatics.

[14]  Wentao Liu,et al.  Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[15]  Jie Xu,et al.  A novel intrusion severity analysis approach for Clouds , 2013, Future Gener. Comput. Syst..

[16]  Soumya Mathew,et al.  Securing Cloud from Attacks based on Intrusion Detection System , 2012 .

[17]  K. Popovic,et al.  Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.

[18]  Eystein Mathisen,et al.  Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).

[19]  Yi Mu,et al.  Identity-based data storage in cloud computing , 2013, Future Gener. Comput. Syst..