Design of the Network Security Intrusion Detection System Based on the Cloud Computing

Author(s):  
Meng Di
2019 ◽  
Author(s):  
Mamay Syani

Cloud Computing merepresentasikan teknologi untuk menggunakan infrastruktur komputasi dengan cara yang lebih efisien, Di sisi lain, arsitektur yang rumit dan terdistribusi semacam itu menjadi target yang menarik bagi para penyusup Cyberattacks. Penelitian ini melakukan analisis dan membangun sistem keamanan jaringan infrastruktur Cloud computing pada studi kasus di sektor pendidikan. Infrastruktur dibangun berdasarkan kebutuhan pengguna yang diperoleh melalui metode wawancara. Metodologi penelitian yang digunakan yaitu metodologi NDLC yang terdiri dari 6 tahap namun dalam penelitian ini hanya memakai 5 tahapan dari metodologi NDLC. Hasil pengujian menunjukkan bahwa sistem keamanan jaringan yang dibangun sudah berhasil dan sistem Cloud yang bangun memenuhi user requirement. hasil uji terhadap kinerja sistem menunjukan bahwa pada parameter keakurasian pendeteksian bahwa sistem OSSEC dapat mendeteksi secara akurat dari serangan yang dilakukan penguji, pada parameter kecepatan pendeteksian bahwa sistem OSSEC lumayan cepat dalam mendeteksi adanya ancaman yang masuk, sedangkan pada parameter penggunaan sumber daya bahwa sistem OSSEC mengambil sedikit sekali penggunaan CPU dan RAM sehingga tidak memberatkan server, hasil observasi juga menunjukan bahwa sistem OSSEC yang dibangun berjalan dengan baik, berdasarkan dari observasi yang dilakukan oleh penulis hasil yang didapat terdapat sebanyak 620 peringatan pengintaian, 38849 peringatan authentication control, 569 peringatan attack/misue, 9018 peringatan Access Control, 0 peringatan Network Control, 230 peringatan System Monitor, dan 0 peringatan Policy Violation


2021 ◽  
Author(s):  
Farah Jemili ◽  
Hajer Bouras

In today’s world, Intrusion Detection System (IDS) is one of the significant tools used to the improvement of network security, by detecting attacks or abnormal data accesses. Most of existing IDS have many disadvantages such as high false alarm rates and low detection rates. For the IDS, dealing with distributed and massive data constitutes a challenge. Besides, dealing with imprecise data is another challenge. This paper proposes an Intrusion Detection System based on big data fuzzy analytics; Fuzzy C-Means (FCM) method is used to cluster and classify the pre-processed training dataset. The CTU-13 and the UNSW-NB15 are used as distributed and massive datasets to prove the feasibility of the method. The proposed system shows high performance in terms of accuracy, precision, detection rates, and false alarms.


With winning advances like catch of Things, Cloud Computing and Social Networking, mammoth proportions of framework traffic associated information area unit made Intrusion Detection System for sort out security suggests the strategy to look at partner unapproved access on framework traffic. For Intrusion Detection System we are going to call attention to with respect to Machine Learning Approaches. it's accomplice rising field of enrolling which can explicitly act with a decent arrangement of less human affiliation. System gains from the data intentionally affirmation and makes perfect objectives. all through this paper we keep an eye on zone unit going to separated styles of Machine Learning pulls in near and had done relative examination in it. inside the last we keep an eye on territory unit going to foreseen the idea of hybrid development, that might be a blend of host principally and framework based for the most part Intrusion Detection System.


2020 ◽  
pp. 1042-1059 ◽  
Author(s):  
Ammar Almomani ◽  
Mohammad Alauthman ◽  
Firas Albalas ◽  
O. Dorgham ◽  
Atef Obeidat

This article describes how as network traffic grows, attacks on traffic become more complicated and harder to detect. Recently, researchers have begun to explore machine learning techniques with cloud computing technologies to classify network threats. So, new and creative ways are needed to enhance intrusion detection system. This article addresses the source of the above issues through detecting an intrusion in cloud computing before it further disrupts normal network operations, because the complexity of malicious attack techniques have evolved from traditional malicious attack technologies (direct malicious attack), which include different malicious attack classes, such as DoS, Probe, R2L, and U2R malicious attacks, especially the zero-day attack in online mode. The proposed online intrusion detection cloud system (OIDCS) adopts the principles of the new spiking neural network architecture called NeuCube algorithm. It is proposed that this system is the first filtering system approach that utilizes the NeuCube algorithm. The OIDCS inherits the hybrid (supervised/unsupervised) learning feature of the NeuCube algorithm and uses this algorithm in an online system with lifelong learning to classify input while learning the system. The system is accurate, especially when working with a zero-day attack, reaching approximately 97% accuracy based on the to-be-remembered (TBR) encoding algorithm.


Author(s):  
Ming-Yi Liao ◽  
Zhi-Kai Mo ◽  
Mon-Yen Luo ◽  
Chu-Sing Yang ◽  
Jiann-Liang Chen

Sign in / Sign up

Export Citation Format

Share Document