Toward a policy-based distributed intruison detection system in cloud computing using data mining approaches

Author(s):  
Hamid Reza Ghorbani ◽  
Roya Salek Shahrezaie
2018 ◽  
Vol 7 (2.4) ◽  
pp. 10
Author(s):  
V Mala ◽  
K Meena

Traditional signature based approach fails in detecting advanced malwares like stuxnet, flame, duqu etc. Signature based comparison and correlation are not up to the mark in detecting such attacks. Hence, there is crucial to detect these kinds of attacks as early as possible. In this research, a novel data mining based approach were applied to detect such attacks. The main innovation lies on Misuse signature detection systems based on supervised learning algorithm. In learning phase, labeled examples of network packets systems calls are (gave) provided, on or after which algorithm can learn about the attack which is fast and reliable to known. In order to detect advanced attacks, unsupervised learning methodologies were employed to detect the presence of zero day/ new attacks. The main objective is to review, different intruder detection methods. To study the role of Data Mining techniques used in intruder detection system. Hybrid –classification model is utilized to detect advanced attacks.


2013 ◽  
Vol 4 (4) ◽  
pp. 113-126 ◽  
Author(s):  
Usukhbayar Baldangombo ◽  
Nyamjav Jambaljav ◽  
Shi-Jinn Horng

2013 ◽  
Vol 18 (4) ◽  
pp. 418-427 ◽  
Author(s):  
Jianlin Xu ◽  
Yifan Yu ◽  
Zhen Chen ◽  
Bin Cao ◽  
Wenyu Dong ◽  
...  

2017 ◽  
Vol 25 (5) ◽  
pp. 1585-1601
Author(s):  
Wesam S Bhaya ◽  
Mustafa A Ali

Malicious software is any type of software or codes which hooks some: private information, data from the computer system, computer operations or(and) merely just to do malicious goals of the author on the computer system, without permission of the computer users. (The short abbreviation of malicious software is Malware). However, the detection of malware has become one of biggest issues in the computer security field because of the current communication infrastructures are vulnerable to penetration from many types of malware infection strategies and attacks.  Moreover, malwares are variant and diverse in volume and types and that strictly explode the effectiveness of traditional defense methods like signature approach, which is unable to detect a new malware. However, this vulnerability will lead to a successful computer system penetration (and attack) as well as success of more advanced attacks like distributed denial of service (DDoS) attack. Data mining methods can be used to overcome limitation of signature-based techniques to detect the zero-day malware. This paper provides an overview of malware and malware detection system using modern techniques such as techniques of data mining approach to detect known and unknown malware samples.


2014 ◽  
Vol 1079-1080 ◽  
pp. 779-781
Author(s):  
Shu Li Huang

In today's era of big data, how to quickly find the data they need is a difficult thing from the mass of information, in order to achieve this goal, cloud computing to data mining technology provides a new direction, this article on how cloud environment attribute Reduction using data mining techniques are described.


Sign in / Sign up

Export Citation Format

Share Document