Provides a hybrid approach to increase the accuracy of intrusion detection in cloud computing and the generation of false alarms

Auteurs

  • Mohammad Hossein Ameri Islamic Azad University Nour Branch- Department of computer science

Mots-clés :

Cloud computing, intrusion, intrusion detection, warning management

Résumé

As cloud computing services are presented via internet, the security and privacy are the key issues these services encounter. The open and distributive (decentralized) structure of cloud computing has changed this kind of computing into targets for hackers, cyber attackers and intruders. The relevant studies conducted by the International Data Research Institute reveal that security is the biggest challenge for cloud computing.
For efficiency and more effectiveness of intrusion detection systems, they should take detection in real-time and online. Intrusion detection systems (IDS) using signature-based detection techniques (like snort) are careful and real-time intrusion systems, which can detect known attacks immediately and activate security mechanisms according to known attack patterns and known attach databank. However, these systems practically lose their efficiency against unknown attacks. Hence, this study has tried to present a hybrid method to enhance intrusion detection accuracy in cloud computing and the amount of production of false warnings in them.

Téléchargements

Les données relatives au téléchargement ne sont pas encore disponibles.

Biographie de l'auteur

Mohammad Hossein Ameri, Islamic Azad University Nour Branch- Department of computer science

Islamic Azad University Nour Branch- Department of computer science

Références

Arbib, Michael A. The Handbook of Brain Theory & Neural Networks. MIT Press, 2003.

Archer, Jerry, and (Others). Security Guidance for Critical Areas of Focus in Cloud Computing V 3.0. CSA (Cloud Security Alliance), 2011.

Antón Chávez, A.D.P (2017). Influencia de la noticia en la imagen corporativa de una municipalidad desde la percepción del ciudadano. Opción, Año 33, No. 84 (2017): 90-119

Castillo, Oscar, and Patricia Melin. Soft Computing and Fractal Theory for Intelligent Manufacturing. springer, 2003.

Gowrison, and (Others). "Minimal complexity attack classification intrusion detection system." Elsevier, Applied Soft Computing 2013, 2013: 921-927.

Han, Jiawei, and Micheline Kamber. Data Mining: Concepts and Techniques. 2006.

Keshtkar, M. (2013) Research Article Simulation of Thermo-Hydraulic Behavior of a Lid-Driven Cavity Considering Gas Radiation Effect and a Heat Generation Zone, International Journal of Engineering & Technology, 1(1), 8-23.

Keshtkar M. M. (2013) Numerical Simulation of Radiative Heat Transfer in a Boiler Furnace Contained with a Non-Gray Gas, International Journal of Engineering & Technology, 1(3), 137-148.

Keshtkar M. M., Ghazanfari M. (2017). Numerical Investigation of Fluid Flow and Heat Transfer Inside a 2D Enclosure with Three Hot Obstacles on the Ramp under the Influence of a Magnetic Field, Engineering, Technology & Applied Science Research, 7 (3), 1647-1657.

Bahador M., Keshtkar, M. M., (2017). Reviewing and modeling the optimal output velocity of slot linear diffusers to reduce air contamination in the surgical site of operating rooms, INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 17 (8), 82-89.

Modi, Chiragh N, and (Others). "A novel framework for intrusion detection in cloud." ACM, Proceedings of the Fifth International Conference on Security of Information and Networks. ACM, 2012. 67-74.

S. M. Seyedhosseini, M. J. Esfahani, M. Ghaffari: A novel hybrid algorithm based on a harmony search and artificial bee colony for solving a portfolio optimization problem using a mean-semi variance approach. J Central South University 23 (2016), No. 1,181–188.

G Soleimani, M Amiri, SM Khatami, MJ Isfahani :Using S Technology, in the Automotive Industry, with the Approach of Its Implementation in Commercial Vehicles . Industrial Engineering & Management Systems.2016; 15(4): pp.290-297

Gonzáles Llontop, R & Otero Gonzáles, C (2017). Imaginarios sociales en estudiantes de educación sobre la calidad de la formación investigativa . Opción, Año 33, No. 84 (2017): 759-790.

Modi, Chiragh N, and (Others). "A survey of intrusion detection techniques in Cloud." Journal of Network and Computer Applications, 2013: 42-57.

Modi, Chiragh N, and (Others). "Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing." Elsevier, Procedia Technology, 2nd International Conference on Communication, Computing & Security (ICCCS-2012). Elsevier, 2012. 905-912.

Patel, Ahmed, and (Others). "An intrusion detection and prevention system in cloud computing: A systematic review." Journal of Network and Computer Applications, 2013: 25-41.

Ruggieri, Salvatore. "Efficient C4.5 (classification algorithm)." IEEE Transactions,

Téléchargements

Publiée

2017-12-26

Comment citer

Ameri, M. H. (2017). Provides a hybrid approach to increase the accuracy of intrusion detection in cloud computing and the generation of false alarms. Amazonia Investiga, 6(11), 112–121. Consulté à l’adresse https://amazoniainvestiga.info/index.php/amazonia/article/view/602

Numéro

Rubrique

Articles