An Intrusion Detection System in Cloud Environments using Combined Machine Learning Algorithms

Publish Year: 1395
نوع سند: مقاله کنفرانسی
زبان: English
View: 522

This Paper With 9 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

این Paper در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ITCC03_067

تاریخ نمایه سازی: 6 اردیبهشت 1396

Abstract:

One of the major security issues in cloud computing is protection against network intrusions that affect confidentiality, availability and integrity of cloud resources and offered services. Since, cloud computing is a shared environment it is therefore subject to various attacks. Due to increasing incidents of cyber attacks, building effective intrusion detection systems are essential for protecting the cloud environments security, and till now it remains an elusive goal and a big challenge. In this paper, an Intrusion Detection System (IDS), regarding the host-based model for cloud computing is proposed according to the Bagging algorithm for virtual machines. In the pre-processing stage, by using a feature selection algorithm, we have chosen 11 of 11 features from the NSL-KDD dataset. We have used three well-known classifiers, namely the decision tree, Bayesian and K- Nearest Neighbor (KNN). Simulation results compared with these three classifiers separately and another method using the Random Forest algorithm shows improvements in terms of precision, recall, TPR and FPR.

Authors

Marjan Naderan

Corresponding Author ,Computer Engineering Department Shahid Chamran University of Ahvaz Ahvaz, Iran

Elham Besharati

Computer Engineering Department Shahid Chamran University of Ahvaz Ahvaz, Iran

Ehsan Namjoo

Electrical Engineering DepartmentShahid Chamran University of AhvazAhvaz, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • K. Ilgun, R.A. Kemmerer, and P.A .Porras, "State transition analysis: ...
  • K. Vieira, A. Schulter, C. Westphall, "Intrusion detection techniques in ...
  • N.D.Man, H. Eui-Nam, "A collaborative intrusion detection system framework for ...
  • D. Dasgupta and F. Gonz' alez _ Immunity- Based Technique ...
  • Panda, M., Abraham, A., Das, S., & Patra, M. R, ...
  • Karthick, R. Rangadurai, "Adaptive network intrusion detection system using a ...
  • K.Deepa, and M.Chatterjee. "An adaptive distributed intrusion detection system for ...
  • نمایش کامل مراجع