A Secure Model for Detecting Intruder on Cloud Environment

Authors

  • Himali Gajjar, Zakiyabanu Malek

Keywords:

CNN; convolutional neural network; network security; intrusion detection; deep learning

Abstract

An IDS is a security service that monitors and analyzes network and system events  to detect and alert on unauthorized access to system resources in real time or near real time. Unlike a firewall, which sits at the perimeter and acts as a gatekeeper monitoring network traffic and evaluating whether traffic should be allowed into the network or endpoints, an IDS focuses on internal network traffic to detect  suspicious or malicious activity. This allows an IDS to detect attacks that originate from within the network as well as attacks that bypass the firewall. A network-based intrusion detection system (NIDS) can protect sensitive data by monitoring the network for unauthorized access attempts. It can detect real-time events such as suspicious activity and alert security personnel so that they can take appropriate measures to prevent data loss or theft. A NIDS can also detect hidden security threats, such as attacks that bypass firewalls and other perimeter security controls.

Downloads

Download data is not yet available.

References

https://www.techtarget.com/searchenterpriseai/definition/convolutional-neural-network

https://www.hindawi.com/journals/scn/2020/8891185/

https://ieeexplore.ieee.org/author/37088519064 ,, Said Ouiazzane, Malika Addou, Fatimazahra Barramou, "A Suricata and Machine Learning Based Hybrid Network Intrusion Detection System", Advances in Information, Communication and Cybersecurity, vol.357, pp.474, 2022.

Shweta Gumaste, Narayan D. G., Sumedha Shinde, Amit K, "Detection of DDoS Attacks in OpenStack-based Private Cloud Using Apache Spark", Journal of Telecommunications and Information Technology, vol.4, pp.62, 2021.

Mohammadpour, L.; Ling. T.C; Liew: C.S.; Aryanfar, A. The Survey ofaCNN-Based Network Intrusion Detection. Appl. Sci. 2022, 12, 8162. https://doi.org/10.3390/app12168162

Mohammadpour L, Ling TC, Liew CS, Aryanfar A. A Survey of CNN-Based Network Intrusion Detection. Applied Sciences. 2022; 12(16):8162. https://doi.org/10.3390/app12168162

H. Gajjar and Z. Malek, "A Survey of Intrusion Detection System (IDS) using Openstack Private Cloud," 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK, 2020, pp. 162-168, doi: 10.1109/ WorldS450073.2020.9210313.

Yogesh Kumar, Rajiv Munjal and Harsh Sharma,”.Comparison of Symmetric and Asymmetric Cryptography withExisting Vulnerabilities and Countermeasures” IJCSMS International Journal of Computer Science and ManagementStudies, Vol. 11, Issue 03, Oct 2011.

Mr. Gurjeevan Singh, Mr. AshwaniSingla and Mr. K S Sandha “ Cryptography Algorithm Compaison ForSecurity Enhancement In Wireless Intrusion Detection System” International Journal of Multidisciplinary ResearchVol.1 Issue 4, August 2011.

Mr. Gurjeevan Singh, Mr. AshwaniSingla and Mr. K S Sandha “ Cryptography Algorithm Compaison ForSecurity Enhancement In Wireless Intrusion Detection System” International Journal of Multidisciplinary ResearchVol.1 Issue 4, August 2011.

D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud ,“ Performance Evaluation of SymmetricEncryption Algorithms”, Communications of the IBIMA Volume 8, 2009.

Bhaskar Mandal ,Tanupriya, Choudhury, “A Secure Biometric Image Encryption Scheme using Chaos and Wavelet Transformations”, International Journal of Advanced Security in Data Analytics and Networks (Special Issue for Recent Advances in Communications and Networking Technology),2016.

“Honeypots: Catching the Insider Threat”, available at Lance Spitzner Honeypot Technologies Inc. lance@Honeypots.com.

Karthik Sadasivam, Banuprasad Samudrala, T. Andrew Yang. “Design of Network Security Projects using Honeypots”, University of Houston.

Downloads

Published

12.06.2024

How to Cite

Himali Gajjar. (2024). A Secure Model for Detecting Intruder on Cloud Environment. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 3436 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/6859

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.