Skip to main content

Security Analysis in Cloud Environment

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 324))

  • 2099 Accesses

Abstract

Cloud computing is a new environment similar to distributed systems and is limited to its use of networking. Therefore, security issues are prevalent and cannot be ignored. Intrusion detection systems (IDS) are used to detect malicious behavior in network communication and hosts in real time. An open-source IDS widely in use is Snort, powerful IDS that can be configured by writing simple rules to detect a wide variety of hostile or suspicious network traffic. But IDS alone cannot effectively analyze the security threats as they have high rates of false alerts. Several machine learning and neural network algorithms have been tested on available datasets, and it has been proved that these algorithms help reduce false alerts up to a large extent. In this paper, we propose a way to bridge the gap between intrusion detection system benchmarking and real-world attacks by making use of effective and efficient algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Zarrabi, A. Zarrabi, Internet intrusion detection system service in a cloud. Int. J. Comput. Sci. 9(5) (2012)

    Google Scholar 

  2. S. Mukkamala, G .Janoski, A. Sung, Intrusion detection using neural networks and support vector machines. IEEE-IJCNN (2002)

    Google Scholar 

  3. A. Singh, M. Shrivastava, Overview of attacks on cloud computing. Int. J. Eng. Innovative Technol. 1(4) (2012)

    Google Scholar 

  4. M. Roesch, Snort-lightweight intrusion detection for network, in Proceedings of Lisa ’99 (1999)

    Google Scholar 

  5. R. Sondhiya, M. Shreevastav, M. Mishra, To improve security in cloud computing with intrusion detection system using neural network. Int. J. Soft Comput. Eng. 3(2) (2013)

    Google Scholar 

  6. K. Patel, R. Srivastava, Classification of cloud data using bayesian classification. Int. J. Sci .Res. 2(6) (2013)

    Google Scholar 

  7. M.D. Holtz, B.M David, R. Timoteo, Building scalable distributed intrusion detection systems based on map reduce framework. Revista Telecommun. 1 (2011)

    Google Scholar 

  8. H.G. Kayacık, N. Zincir-Heywood, Analysis of three intrusion detection system benchmark dataset using machine learning algorithm. Int. J. Eng. Innovative Technol. (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. S. Akshay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Akshay, M.S., Kakkar, A., Jayasree, K., Prudhvi, P., Metgal, P.S. (2015). Security Analysis in Cloud Environment. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_25

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2126-5_25

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2125-8

  • Online ISBN: 978-81-322-2126-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics