slugAn Advanced Hybrid Intrusion Detection System in Cloud Computing Environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 6
Abstract
Today, Cloud Computing Security (also known as Cloud Security) is the major concern. Cyber-attacks have not only grown to an unimaginable volume but also a sophistication and variety that would have been hard to believe a few years back. Cloud Computing holds the potential to eliminate the requirements for setting up high cost computing infrastructure for the I.T based solution and services that the industry uses. In computer networking, cloud computing is computing that involves a large number of computers connected through a communication network such as the Internet. Cloud computing and Intrusion detection and prevention system are one such measure to reduce these attacks. Different researches have proposed different IDS’s time to time. Most of the researchers combine the features of Anomaly based detection methodologies and Signature based methodologies. Intrusion Detection System which is more efficient than the traditional Intrusion Detection System. In this paper, we present a modified Hybrid Intrusion Detection System that combines the advantages of two different detection methodologiesAnomaly based intrusion detection methodology and Honeypot methodology. We use both the IDS individually and then together and maintain the data record time to time. From the data record we find conclusion that the resulting Intrusion Detection System is much better in detection intrusions from the existing Intrusion Detection Systems.
Authors and Affiliations
Vikas Singh, Amit Kumar, Astt. Prof. Devender Kumar
Performance Analysis of Diesel Blended Insulating Oil In A Ci Engine
Insulating oil other wise called as transformer oil is oil that is stable at high temperatures and has excellent electrical insulating properties. It is used in oil-filled transformers, some types of high-voltage capaci...
Topological Optimization Of An L-shaped Bracket Subjected to Different Loading Conditions
Topology optimization is an very powerful tool in many areas of design such as optics, electronics and structural mechanics. The field materialized from structural design and so topology optimization applied in this con...
The Survey on Energy Efficient Routing Protocols
In this paper we propose an approach. The wireless sensor network consists of the nodes, base station and these networks are low cost, has limited battery, which is rechargeable, other than battery, gateways can be used...
Implementation of Binary Mask Algorithm for Noise Reduction in Traffic Environment
In this paper, we present a real-time implementation of the binary masking algorithm, which has been shown to significantly reduce the noise and improves speech-in-noise intelligibility. Binary masking algorithm is an e...
Fabrication of Al-SiC Metal Matrix Composites Using Two Steps Mixing in Stir Casting
The applications of MMC are keep on growing day by day. Everyone requires a material which can fulfil the required designed strength criteria but it is mostly preferred to have a lighter material. Aluminium matrix compo...