Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System

INTRODUCTION: Cloud computing offers on-demand services, from which consumers can avail networked storage and computer resources. Due to the fact that cloud is accessed through internet, its data are prone to internal and external intrusions. Cloud Intrusion Detection System will...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Sivakami Raja, S. Pran, N. Pandeeswari, P. Kiruthiga, D. Nithya, G. MuthuPandi
Formato: article
Lenguaje:EN
Publicado: European Alliance for Innovation (EAI) 2021
Materias:
Q
Acceso en línea:https://doaj.org/article/3a647aac25bb45ca99e31873453b4ac8
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:3a647aac25bb45ca99e31873453b4ac8
record_format dspace
spelling oai:doaj.org-article:3a647aac25bb45ca99e31873453b4ac82021-11-30T11:07:23ZContemporary PCA and NBA based Hybrid Cloud Intrusion Detection System2032-944X10.4108/eai.19-2-2021.168727https://doaj.org/article/3a647aac25bb45ca99e31873453b4ac82021-11-01T00:00:00Zhttps://eudl.eu/pdf/10.4108/eai.19-2-2021.168727https://doaj.org/toc/2032-944XINTRODUCTION: Cloud computing offers on-demand services, from which consumers can avail networked storage and computer resources. Due to the fact that cloud is accessed through internet, its data are prone to internal and external intrusions. Cloud Intrusion Detection System will now be able to classify each pattern of testing dataset as either normal or intrusive and in case of intrusion, it will identify the type of intrusion. By comparing each of these actual results with the expected results of testing dataset. It is strongly observing the inside-activities of a network. Hence, it is suitable for detecting intrusions in cloud environment. OBJECTIVES: Hybrid Cloud Intrusion Detection System can function well for a very huge dataset and it can also detect unknown attacks. To achieve the better performance in the cloud setting by utilizing this Cloud Intrusion Detection System. METHODS: To overcome performance issues, Principal Component Analysis and Network Behaviour Analysis are proposed. RESULTS: The experimental and performance assessment show that the proposed model is well planned, efficient and effective in finding cloud environment intrusions. An Intrusion Detection System (IDS) monitors all incoming and outgoing network activity to identifies any signs of intrusion in your system that could compromise your systems. CONCLUSION: Experiments are performed using a standard benchmark KDD-cup dataset and the findings are addressed. IDS helps the Network Administrator to track down bad guys on the Internet whose very purpose is to bring you r network to a breach point and make it vulnerable to attacks.Sivakami RajaS. PranN. PandeeswariP. KiruthigaD. NithyaG. MuthuPandiEuropean Alliance for Innovation (EAI)articlecloud computingintrusion detectionprincipal component analysisnetwork behaviour analysisgenetic algorithmScienceQMathematicsQA1-939Electronic computers. Computer scienceQA75.5-76.95ENEAI Endorsed Transactions on Energy Web, Vol 8, Iss 36 (2021)
institution DOAJ
collection DOAJ
language EN
topic cloud computing
intrusion detection
principal component analysis
network behaviour analysis
genetic algorithm
Science
Q
Mathematics
QA1-939
Electronic computers. Computer science
QA75.5-76.95
spellingShingle cloud computing
intrusion detection
principal component analysis
network behaviour analysis
genetic algorithm
Science
Q
Mathematics
QA1-939
Electronic computers. Computer science
QA75.5-76.95
Sivakami Raja
S. Pran
N. Pandeeswari
P. Kiruthiga
D. Nithya
G. MuthuPandi
Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System
description INTRODUCTION: Cloud computing offers on-demand services, from which consumers can avail networked storage and computer resources. Due to the fact that cloud is accessed through internet, its data are prone to internal and external intrusions. Cloud Intrusion Detection System will now be able to classify each pattern of testing dataset as either normal or intrusive and in case of intrusion, it will identify the type of intrusion. By comparing each of these actual results with the expected results of testing dataset. It is strongly observing the inside-activities of a network. Hence, it is suitable for detecting intrusions in cloud environment. OBJECTIVES: Hybrid Cloud Intrusion Detection System can function well for a very huge dataset and it can also detect unknown attacks. To achieve the better performance in the cloud setting by utilizing this Cloud Intrusion Detection System. METHODS: To overcome performance issues, Principal Component Analysis and Network Behaviour Analysis are proposed. RESULTS: The experimental and performance assessment show that the proposed model is well planned, efficient and effective in finding cloud environment intrusions. An Intrusion Detection System (IDS) monitors all incoming and outgoing network activity to identifies any signs of intrusion in your system that could compromise your systems. CONCLUSION: Experiments are performed using a standard benchmark KDD-cup dataset and the findings are addressed. IDS helps the Network Administrator to track down bad guys on the Internet whose very purpose is to bring you r network to a breach point and make it vulnerable to attacks.
format article
author Sivakami Raja
S. Pran
N. Pandeeswari
P. Kiruthiga
D. Nithya
G. MuthuPandi
author_facet Sivakami Raja
S. Pran
N. Pandeeswari
P. Kiruthiga
D. Nithya
G. MuthuPandi
author_sort Sivakami Raja
title Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System
title_short Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System
title_full Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System
title_fullStr Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System
title_full_unstemmed Contemporary PCA and NBA based Hybrid Cloud Intrusion Detection System
title_sort contemporary pca and nba based hybrid cloud intrusion detection system
publisher European Alliance for Innovation (EAI)
publishDate 2021
url https://doaj.org/article/3a647aac25bb45ca99e31873453b4ac8
work_keys_str_mv AT sivakamiraja contemporarypcaandnbabasedhybridcloudintrusiondetectionsystem
AT spran contemporarypcaandnbabasedhybridcloudintrusiondetectionsystem
AT npandeeswari contemporarypcaandnbabasedhybridcloudintrusiondetectionsystem
AT pkiruthiga contemporarypcaandnbabasedhybridcloudintrusiondetectionsystem
AT dnithya contemporarypcaandnbabasedhybridcloudintrusiondetectionsystem
AT gmuthupandi contemporarypcaandnbabasedhybridcloudintrusiondetectionsystem
_version_ 1718406675802619904