CFP last date
20 December 2024
Reseach Article

An Optimal Approach for Intrusion Security in Cloud

by Jitendra Kumar Seth, Satish Chandra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 13
Year of Publication: 2014
Authors: Jitendra Kumar Seth, Satish Chandra
10.5120/17066-7481

Jitendra Kumar Seth, Satish Chandra . An Optimal Approach for Intrusion Security in Cloud. International Journal of Computer Applications. 97, 13 ( July 2014), 32-35. DOI=10.5120/17066-7481

@article{ 10.5120/17066-7481,
author = { Jitendra Kumar Seth, Satish Chandra },
title = { An Optimal Approach for Intrusion Security in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 13 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 32-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number13/17066-7481/ },
doi = { 10.5120/17066-7481 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:24:00.575773+05:30
%A Jitendra Kumar Seth
%A Satish Chandra
%T An Optimal Approach for Intrusion Security in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 13
%P 32-35
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is internet based technology that provides online resources on pay per use basis. This computing technology is dependent on virtualization. By registering with cloud providers customers can use services (soft and hard) on pay per use basis. Customers are getting services in the form of virtual machines, they interact with these virtual machines to do their jobs. In recent survey it is found that security is the top most concern associated with cloud services. Customers are always afraid of adopting clouds services as their data are stored out of their network boundary and administration. Researchers in cloud are trying to develop security models to protect cloud services from intrusions including internal and external. In this paper we have proposed an intrusion security model that uses the optimum cloud resources and increases the resource and service availability.

References
  1. Wenke Lee, "A Framework for Constructing Features and Models for Intrusion Detection Systems" ACM Transactions on Information and System Security, Vol. 3, No. 4, November 2000.
  2. Leila Mechtri1 et. al. ," Intrusion Detection Using Principal Component Analysis" in (ICESMA), IEEE 2010
  3. Chirag Modi et. al. ," A Novel Framework for Intrusion Detection in Cloud" in SIN'12,ACM October 2012.
  4. Leila Mechtri1 et. al. ," Intrusion Detection Using Principal Component Analysis" in (ICESMA), IEEE 2010
  5. Yong-Xiang Xia et. al. ," An Incremental SVM for Intrusion Detection Based on Key Feature Selection" in Third International Symposium on Intelligent Information Technology Application, IEEE,2009.
  6. Noreen Kausar et. al. ," An Approach towards Intrusion Detection using PCA Feature Subsets and SVM", in ICCIS IEEE, 2012.
  7. Xin Zhang," The Application of Machine Learning Methods to Intrusion Detection" in IEEE 2012.
  8. Udaya Tupakula et. al. ," Intrusion Detection Techniques for Infrastructure as a Service Cloud" in Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing 2011.
  9. Mohammed Hussain," SECaaS: Security as a Service for Cloud-based Applications", Second Kuwait Conf. on E-Services and E-Systems,ACM,2011.
  10. Thomas Ristenpart et. al. , "Hey, You, Get off my cloud: Exploring Information leakage in third-party compute clouds", Proceedings of ACM CCS 2009.
  11. Jun-Ho Lee et. al. ," Multilevel Intrusion Detection System and Log Management in cloud computing", Advanced Communication Technology (ICACT), IEEE, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

IDS Cloud Virtual Machine Availability Classifier ANN