Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System
INTRODUCTION: Cloud computing offers on-demand services, from which consumers can avail networked storage and computer resources. Due to the fact that cloud is accessed through internet, its data are prone to internal and external intrusions. Cloud Intrusion Detection System will...
Guardado en:
Autores principales: | , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
European Alliance for Innovation (EAI)
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/3a647aac25bb45ca99e31873453b4ac8 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:3a647aac25bb45ca99e31873453b4ac8 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:3a647aac25bb45ca99e31873453b4ac82021-11-30T11:07:23ZContemporary PCA and NBA based Hybrid Cloud Intrusion Detection System2032-944X10.4108/eai.19-2-2021.168727https://doaj.org/article/3a647aac25bb45ca99e31873453b4ac82021-11-01T00:00:00Zhttps://eudl.eu/pdf/10.4108/eai.19-2-2021.168727https://doaj.org/toc/2032-944XINTRODUCTION: Cloud computing offers on-demand services, from which consumers can avail networked storage and computer resources. Due to the fact that cloud is accessed through internet, its data are prone to internal and external intrusions. Cloud Intrusion Detection System will now be able to classify each pattern of testing dataset as either normal or intrusive and in case of intrusion, it will identify the type of intrusion. By comparing each of these actual results with the expected results of testing dataset. It is strongly observing the inside-activities of a network. Hence, it is suitable for detecting intrusions in cloud environment. OBJECTIVES: Hybrid Cloud Intrusion Detection System can function well for a very huge dataset and it can also detect unknown attacks. To achieve the better performance in the cloud setting by utilizing this Cloud Intrusion Detection System. METHODS: To overcome performance issues, Principal Component Analysis and Network Behaviour Analysis are proposed. RESULTS: The experimental and performance assessment show that the proposed model is well planned, efficient and effective in finding cloud environment intrusions. An Intrusion Detection System (IDS) monitors all incoming and outgoing network activity to identifies any signs of intrusion in your system that could compromise your systems. CONCLUSION: Experiments are performed using a standard benchmark KDD-cup dataset and the findings are addressed. IDS helps the Network Administrator to track down bad guys on the Internet whose very purpose is to bring you r network to a breach point and make it vulnerable to attacks.Sivakami RajaS. PranN. PandeeswariP. KiruthigaD. NithyaG. MuthuPandiEuropean Alliance for Innovation (EAI)articlecloud computingintrusion detectionprincipal component analysisnetwork behaviour analysisgenetic algorithmScienceQMathematicsQA1-939Electronic computers. Computer scienceQA75.5-76.95ENEAI Endorsed Transactions on Energy Web, Vol 8, Iss 36 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
cloud computing intrusion detection principal component analysis network behaviour analysis genetic algorithm Science Q Mathematics QA1-939 Electronic computers. Computer science QA75.5-76.95 |
spellingShingle |
cloud computing intrusion detection principal component analysis network behaviour analysis genetic algorithm Science Q Mathematics QA1-939 Electronic computers. Computer science QA75.5-76.95 Sivakami Raja S. Pran N. Pandeeswari P. Kiruthiga D. Nithya G. MuthuPandi Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System |
description |
INTRODUCTION: Cloud computing offers on-demand services, from which consumers can avail networked storage and computer resources. Due to the fact that cloud is accessed through internet, its data are prone to internal and external intrusions. Cloud Intrusion Detection System will now be able to classify each pattern of testing dataset as either normal or intrusive and in case of intrusion, it will identify the type of intrusion. By comparing each of these actual results with the expected results of testing dataset. It is strongly observing the inside-activities of a network. Hence, it is suitable for detecting intrusions in cloud environment. OBJECTIVES: Hybrid Cloud Intrusion Detection System can function well for a very huge dataset and it can also detect unknown attacks. To achieve the better performance in the cloud setting by utilizing this Cloud Intrusion Detection System. METHODS: To overcome performance issues, Principal Component Analysis and Network Behaviour Analysis are proposed. RESULTS: The experimental and performance assessment show that the proposed model is well planned, efficient and effective in finding cloud environment intrusions. An Intrusion Detection System (IDS) monitors all incoming and outgoing network activity to identifies any signs of intrusion in your system that could compromise your systems. CONCLUSION: Experiments are performed using a standard benchmark KDD-cup dataset and the findings are addressed. IDS helps the Network Administrator to track down bad guys on the Internet whose very purpose is to bring you r network to a breach point and make it vulnerable to attacks. |
format |
article |
author |
Sivakami Raja S. Pran N. Pandeeswari P. Kiruthiga D. Nithya G. MuthuPandi |
author_facet |
Sivakami Raja S. Pran N. Pandeeswari P. Kiruthiga D. Nithya G. MuthuPandi |
author_sort |
Sivakami Raja |
title |
Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System |
title_short |
Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System |
title_full |
Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System |
title_fullStr |
Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System |
title_full_unstemmed |
Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System |
title_sort |
contemporary pca and nba based hybrid cloud intrusion detection system |
publisher |
European Alliance for Innovation (EAI) |
publishDate |
2021 |
url |
https://doaj.org/article/3a647aac25bb45ca99e31873453b4ac8 |
work_keys_str_mv |
AT sivakamiraja contemporarypcaandnbabasedhybridcloudintrusiondetectionsystem AT spran contemporarypcaandnbabasedhybridcloudintrusiondetectionsystem AT npandeeswari contemporarypcaandnbabasedhybridcloudintrusiondetectionsystem AT pkiruthiga contemporarypcaandnbabasedhybridcloudintrusiondetectionsystem AT dnithya contemporarypcaandnbabasedhybridcloudintrusiondetectionsystem AT gmuthupandi contemporarypcaandnbabasedhybridcloudintrusiondetectionsystem |
_version_ |
1718406675802619904 |