Provides a hybrid approach to increase the accuracy of intrusion detection in cloud computing and the generation of false alarms

  • Mohammad Hossein Ameri Islamic Azad University Nour Branch- Department of computer science
Keywords: Cloud computing, intrusion, intrusion detection, warning management

Abstract

As cloud computing services are presented via internet, the security and privacy are the key issues these services encounter. The open and distributive (decentralized) structure of cloud computing has changed this kind of computing into targets for hackers, cyber attackers and intruders. The relevant studies conducted by the International Data Research Institute reveal that security is the biggest challenge for cloud computing.
For efficiency and more effectiveness of intrusion detection systems, they should take detection in real-time and online. Intrusion detection systems (IDS) using signature-based detection techniques (like snort) are careful and real-time intrusion systems, which can detect known attacks immediately and activate security mechanisms according to known attack patterns and known attach databank. However, these systems practically lose their efficiency against unknown attacks. Hence, this study has tried to present a hybrid method to enhance intrusion detection accuracy in cloud computing and the amount of production of false warnings in them.

Downloads

Download data is not yet available.

Author Biography

Mohammad Hossein Ameri, Islamic Azad University Nour Branch- Department of computer science

Islamic Azad University Nour Branch- Department of computer science

References

Arbib, Michael A. The Handbook of Brain Theory & Neural Networks. MIT Press, 2003.

Archer, Jerry, and (Others). Security Guidance for Critical Areas of Focus in Cloud Computing V 3.0. CSA (Cloud Security Alliance), 2011.

Antón Chávez, A.D.P (2017). Influencia de la noticia en la imagen corporativa de una municipalidad desde la percepción del ciudadano. Opción, Año 33, No. 84 (2017): 90-119

Castillo, Oscar, and Patricia Melin. Soft Computing and Fractal Theory for Intelligent Manufacturing. springer, 2003.

Gowrison, and (Others). "Minimal complexity attack classification intrusion detection system." Elsevier, Applied Soft Computing 2013, 2013: 921-927.

Han, Jiawei, and Micheline Kamber. Data Mining: Concepts and Techniques. 2006.

Keshtkar, M. (2013) Research Article Simulation of Thermo-Hydraulic Behavior of a Lid-Driven Cavity Considering Gas Radiation Effect and a Heat Generation Zone, International Journal of Engineering & Technology, 1(1), 8-23.

Keshtkar M. M. (2013) Numerical Simulation of Radiative Heat Transfer in a Boiler Furnace Contained with a Non-Gray Gas, International Journal of Engineering & Technology, 1(3), 137-148.

Keshtkar M. M., Ghazanfari M. (2017). Numerical Investigation of Fluid Flow and Heat Transfer Inside a 2D Enclosure with Three Hot Obstacles on the Ramp under the Influence of a Magnetic Field, Engineering, Technology & Applied Science Research, 7 (3), 1647-1657.

Bahador M., Keshtkar, M. M., (2017). Reviewing and modeling the optimal output velocity of slot linear diffusers to reduce air contamination in the surgical site of operating rooms, INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 17 (8), 82-89.

Modi, Chiragh N, and (Others). "A novel framework for intrusion detection in cloud." ACM, Proceedings of the Fifth International Conference on Security of Information and Networks. ACM, 2012. 67-74.

S. M. Seyedhosseini, M. J. Esfahani, M. Ghaffari: A novel hybrid algorithm based on a harmony search and artificial bee colony for solving a portfolio optimization problem using a mean-semi variance approach. J Central South University 23 (2016), No. 1,181–188.

G Soleimani, M Amiri, SM Khatami, MJ Isfahani :Using S Technology, in the Automotive Industry, with the Approach of Its Implementation in Commercial Vehicles . Industrial Engineering & Management Systems.2016; 15(4): pp.290-297

Gonzáles Llontop, R & Otero Gonzáles, C (2017). Imaginarios sociales en estudiantes de educación sobre la calidad de la formación investigativa . Opción, Año 33, No. 84 (2017): 759-790.

Modi, Chiragh N, and (Others). "A survey of intrusion detection techniques in Cloud." Journal of Network and Computer Applications, 2013: 42-57.

Modi, Chiragh N, and (Others). "Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing." Elsevier, Procedia Technology, 2nd International Conference on Communication, Computing & Security (ICCCS-2012). Elsevier, 2012. 905-912.

Patel, Ahmed, and (Others). "An intrusion detection and prevention system in cloud computing: A systematic review." Journal of Network and Computer Applications, 2013: 25-41.

Ruggieri, Salvatore. "Efficient C4.5 (classification algorithm)." IEEE Transactions,
Published
2017-12-26
How to Cite
Ameri, M. (2017). Provides a hybrid approach to increase the accuracy of intrusion detection in cloud computing and the generation of false alarms. Amazonia Investiga, 6(11), 112-121. Retrieved from https://amazoniainvestiga.info/index.php/amazonia/article/view/602
Section
Articles
Bookmark and Share