A Secure Model for Detecting Intruder on Cloud Environment
Keywords:
CNN; convolutional neural network; network security; intrusion detection; deep learningAbstract
An IDS is a security service that monitors and analyzes network and system events to detect and alert on unauthorized access to system resources in real time or near real time. Unlike a firewall, which sits at the perimeter and acts as a gatekeeper monitoring network traffic and evaluating whether traffic should be allowed into the network or endpoints, an IDS focuses on internal network traffic to detect suspicious or malicious activity. This allows an IDS to detect attacks that originate from within the network as well as attacks that bypass the firewall. A network-based intrusion detection system (NIDS) can protect sensitive data by monitoring the network for unauthorized access attempts. It can detect real-time events such as suspicious activity and alert security personnel so that they can take appropriate measures to prevent data loss or theft. A NIDS can also detect hidden security threats, such as attacks that bypass firewalls and other perimeter security controls.
Downloads
References
https://www.techtarget.com/searchenterpriseai/definition/convolutional-neural-network
https://www.hindawi.com/journals/scn/2020/8891185/
https://ieeexplore.ieee.org/author/37088519064 ,, Said Ouiazzane, Malika Addou, Fatimazahra Barramou, "A Suricata and Machine Learning Based Hybrid Network Intrusion Detection System", Advances in Information, Communication and Cybersecurity, vol.357, pp.474, 2022.
Shweta Gumaste, Narayan D. G., Sumedha Shinde, Amit K, "Detection of DDoS Attacks in OpenStack-based Private Cloud Using Apache Spark", Journal of Telecommunications and Information Technology, vol.4, pp.62, 2021.
Mohammadpour, L.; Ling. T.C; Liew: C.S.; Aryanfar, A. The Survey ofaCNN-Based Network Intrusion Detection. Appl. Sci. 2022, 12, 8162. https://doi.org/10.3390/app12168162
Mohammadpour L, Ling TC, Liew CS, Aryanfar A. A Survey of CNN-Based Network Intrusion Detection. Applied Sciences. 2022; 12(16):8162. https://doi.org/10.3390/app12168162
H. Gajjar and Z. Malek, "A Survey of Intrusion Detection System (IDS) using Openstack Private Cloud," 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK, 2020, pp. 162-168, doi: 10.1109/ WorldS450073.2020.9210313.
Yogesh Kumar, Rajiv Munjal and Harsh Sharma,”.Comparison of Symmetric and Asymmetric Cryptography withExisting Vulnerabilities and Countermeasures” IJCSMS International Journal of Computer Science and ManagementStudies, Vol. 11, Issue 03, Oct 2011.
Mr. Gurjeevan Singh, Mr. AshwaniSingla and Mr. K S Sandha “ Cryptography Algorithm Compaison ForSecurity Enhancement In Wireless Intrusion Detection System” International Journal of Multidisciplinary ResearchVol.1 Issue 4, August 2011.
Mr. Gurjeevan Singh, Mr. AshwaniSingla and Mr. K S Sandha “ Cryptography Algorithm Compaison ForSecurity Enhancement In Wireless Intrusion Detection System” International Journal of Multidisciplinary ResearchVol.1 Issue 4, August 2011.
D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud ,“ Performance Evaluation of SymmetricEncryption Algorithms”, Communications of the IBIMA Volume 8, 2009.
Bhaskar Mandal ,Tanupriya, Choudhury, “A Secure Biometric Image Encryption Scheme using Chaos and Wavelet Transformations”, International Journal of Advanced Security in Data Analytics and Networks (Special Issue for Recent Advances in Communications and Networking Technology),2016.
“Honeypots: Catching the Insider Threat”, available at Lance Spitzner Honeypot Technologies Inc. lance@Honeypots.com.
Karthik Sadasivam, Banuprasad Samudrala, T. Andrew Yang. “Design of Network Security Projects using Honeypots”, University of Houston.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.