slugAn Advanced Hybrid Intrusion Detection System in Cloud Computing Environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 6
Abstract
Today, Cloud Computing Security (also known as Cloud Security) is the major concern. Cyber-attacks have not only grown to an unimaginable volume but also a sophistication and variety that would have been hard to believe a few years back. Cloud Computing holds the potential to eliminate the requirements for setting up high cost computing infrastructure for the I.T based solution and services that the industry uses. In computer networking, cloud computing is computing that involves a large number of computers connected through a communication network such as the Internet. Cloud computing and Intrusion detection and prevention system are one such measure to reduce these attacks. Different researches have proposed different IDS’s time to time. Most of the researchers combine the features of Anomaly based detection methodologies and Signature based methodologies. Intrusion Detection System which is more efficient than the traditional Intrusion Detection System. In this paper, we present a modified Hybrid Intrusion Detection System that combines the advantages of two different detection methodologiesAnomaly based intrusion detection methodology and Honeypot methodology. We use both the IDS individually and then together and maintain the data record time to time. From the data record we find conclusion that the resulting Intrusion Detection System is much better in detection intrusions from the existing Intrusion Detection Systems.
Authors and Affiliations
Vikas Singh, Amit Kumar, Astt. Prof. Devender Kumar
Development of Elastic Modulus - Density Chart for a Typical Femur Bone Model
Finite element (FE) analysis has been widely used to study the behaviour of bone or implants in many clinical applications. One of the main factors in analyses is the realistic behaviour of the bone model, because the b...
A Framework for Focusing Jammers Localization with Minimum Errors and Higher Accuracy in Wireless Networks
Jammers can rigorously interrupt the communications in wireless networks as well in radio interferences, the jamming attacks can be destructively eliminate by the protector thus permits by the jammer location informatio...
Mobile Controlling and Video Streaming Robot in Remote Areas
This paper presents the technical construction of the vehicle controlled by user mobile. The designed GSM based vehicle could be operated from almost anywhere if GSM network exists. The procedurecommences with initiatin...
Friendbook: Semantic Based Friendship
Now a day’s friend recommendation has a greater impact on social networking. Friend recommendation based on social graph may not be most relevant to reflect user’s expectation on friend selection. Propose approach Based...
slugSocial Networking Sites (SNS): A Quick study and its impact for Educational & Social Platform
Social Networking Sites have millions of users with global connections. More and more, people are turning to the Internet to keep in touch with friends, family and colleagues. Some popular social sites in the world are...