Abstract
Cloud computing is a new environment similar to distributed systems and is limited to its use of networking. Therefore, security issues are prevalent and cannot be ignored. Intrusion detection systems (IDS) are used to detect malicious behavior in network communication and hosts in real time. An open-source IDS widely in use is Snort, powerful IDS that can be configured by writing simple rules to detect a wide variety of hostile or suspicious network traffic. But IDS alone cannot effectively analyze the security threats as they have high rates of false alerts. Several machine learning and neural network algorithms have been tested on available datasets, and it has been proved that these algorithms help reduce false alerts up to a large extent. In this paper, we propose a way to bridge the gap between intrusion detection system benchmarking and real-world attacks by making use of effective and efficient algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Zarrabi, A. Zarrabi, Internet intrusion detection system service in a cloud. Int. J. Comput. Sci. 9(5) (2012)
S. Mukkamala, G .Janoski, A. Sung, Intrusion detection using neural networks and support vector machines. IEEE-IJCNN (2002)
A. Singh, M. Shrivastava, Overview of attacks on cloud computing. Int. J. Eng. Innovative Technol. 1(4) (2012)
M. Roesch, Snort-lightweight intrusion detection for network, in Proceedings of Lisa ’99 (1999)
R. Sondhiya, M. Shreevastav, M. Mishra, To improve security in cloud computing with intrusion detection system using neural network. Int. J. Soft Comput. Eng. 3(2) (2013)
K. Patel, R. Srivastava, Classification of cloud data using bayesian classification. Int. J. Sci .Res. 2(6) (2013)
M.D. Holtz, B.M David, R. Timoteo, Building scalable distributed intrusion detection systems based on map reduce framework. Revista Telecommun. 1 (2011)
H.G. Kayacık, N. Zincir-Heywood, Analysis of three intrusion detection system benchmark dataset using machine learning algorithm. Int. J. Eng. Innovative Technol. (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Akshay, M.S., Kakkar, A., Jayasree, K., Prudhvi, P., Metgal, P.S. (2015). Security Analysis in Cloud Environment. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_25
Download citation
DOI: https://doi.org/10.1007/978-81-322-2126-5_25
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2125-8
Online ISBN: 978-81-322-2126-5
eBook Packages: EngineeringEngineering (R0)