scholarly journals A Design of an Integrated Cloud-based Intrusion Detection System with Third Party Cloud Service

2021 ◽  
Vol 11 (1) ◽  
pp. 365-379
Author(s):  
Wisam Elmasry ◽  
Akhan Akbulut ◽  
Abdul Halim Zaim

Abstract Although cloud computing is considered the most widespread technology nowadays, it still suffers from many challenges, especially related to its security. Due to the open and distributed nature of the cloud environment, this makes the cloud itself vulnerable to various attacks. In this paper, the design of a novel integrated Cloud-based Intrusion Detection System (CIDS) is proposed to immunise the cloud against any possible attacks. The proposed CIDS consists of five main modules to do the following actions: monitoring the network, capturing the traffic flows, extracting features, analyzing the flows, detecting intrusions, taking a reaction, and logging all activities. Furthermore an enhanced bagging ensemble system of three deep learning models is utilized to predict intrusions effectively. Moreover, a third-party Cloud-based Intrusion Detection System Service (CIDSS) is also exploited to control the proposed CIDS and provide the reporting service. Finally, it has been shown that the proposed approach overcomes all problems associated with attacks on the cloud raised in the literature.

2014 ◽  
Vol 16 (4) ◽  
pp. 16-26 ◽  
Author(s):  
Partha Ghosh ◽  
◽  
Chameli Debnath ◽  
Dipjyoti Metia ◽  
Dr. Ruma Dutta

2014 ◽  
Vol 10 (10) ◽  
pp. 2029-2036 ◽  
Author(s):  
Mehdi Barati ◽  
Azizol Abdullah ◽  
NurIzura Udzir ◽  
Mostafa Behzadi ◽  
Ramlan Mahmod ◽  
...  

2017 ◽  
Vol 26 (1) ◽  
pp. 29-40 ◽  
Author(s):  
Shawq Malik Mehibs ◽  
Soukaena Hassan Hashim

Cloud computing is distributed architecture, providing computing facilities and storage resource as a service over the internet. This low-cost service fulfills the basic requirements of users. Because of the open nature and services introduced by cloud computing intruders impersonate legitimate users and misuse cloud resource and services. To detect intruders and suspicious activities in and around the cloud computing environment, intrusion detection system used to discover the illegitimate users and suspicious action by monitors different user activities on the network .this work proposed based back propagation artificial neural network to construct t network intrusion detection in the cloud environment. The proposed module evaluated with kdd99 dataset the experimental results shows promising approach to detect attack with high detection rate and low false alarm rate


Sign in / Sign up

Export Citation Format

Share Document