CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Entropy Variation and J48 Algorithm based Intrusion Detection System for Cloud Computing

by Nupur Gautam, Sreeja Nair
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 11
Year of Publication: 2014
Authors: Nupur Gautam, Sreeja Nair
10.5120/18116-9350

Nupur Gautam, Sreeja Nair . Entropy Variation and J48 Algorithm based Intrusion Detection System for Cloud Computing. International Journal of Computer Applications. 103, 11 ( October 2014), 8-14. DOI=10.5120/18116-9350

@article{ 10.5120/18116-9350,
author = { Nupur Gautam, Sreeja Nair },
title = { Entropy Variation and J48 Algorithm based Intrusion Detection System for Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 11 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 8-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number11/18116-9350/ },
doi = { 10.5120/18116-9350 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:34:54.990944+05:30
%A Nupur Gautam
%A Sreeja Nair
%T Entropy Variation and J48 Algorithm based Intrusion Detection System for Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 11
%P 8-14
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now Cloud Computing has achieved formidable impetus where IT infrastructures and applications are provided as service to end users. It provides shared pool of resources in addition with Data storage, computer processing power and specialized corporate and user applications. Users can access Cloud services any time anywhere and store large amount of data from anywhere, due to increases the popularity of Cloud computing there is risk of Security. Data which is stored on cloud may be vulnerable which is easy for attackers to compromise the virtual machines as zombies and explore these vulnerabilities in cloud system. Because when we move data or information in cloud we do not have any control on that data which can be handling by third party. Hence, there is the vital requirement of more security measures to protect cloud. In this paper we propose an Intrusion detection system which is based on Entropy variation and J48 Decision tree algorithm through which we can detect or prevent vulnerable virtual machines, Data center and Host from being compromised in the cloud also we can protect data and applications in Cloud like wide area network traffic. This proposed solution results gives more accuracy for attack detection and low false alarm rate. For simulation we use Cloud Sim (version 3. 1) and used KDDCUP '99 Dataset to evaluate rules and testing datasets to detect intrusion.

References
  1. M. Malathi, "Cloud Computing Concepts", 978-1-4244-8679-3/11/$26. 00 ©2011 IEEE
  2. Nor Badrul Anuar, Hasimi Sallehudin, Abdullah Gani, Omar Zakari, "Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree", Malaysian Journal of Computer Science, Vol. 21(2), 2008 and On Dependable And Secure Computing, Vol. 10, No. 4, July/August 2013.
  3. Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, and Dijiang Huang "NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems", IEEE Transact
  4. Sandeep K. Sood, "A combined approach to ensure data security incloud computing", Journal of Network and Computer Applications 35 (2012) 1831–1838
  5. Mr. Prashant Rewagad, Ms. Yogita Pawar, "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing", 2013 International Conference on Communication Systems and Network Technologies
  6. Helen Sara George, Mrs. Jeno Lovesum, "A Survey On Different Encryption Schemes And Security Challenges In Cloud Storage System", International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 1, January- 2013 ISSN: 2278-0181
  7. Farzad Sabahi, "Cloud Computing Security Threats and Responses", IEEE 2011
  8. Uma Somani, Kanika Lakhani, Manish Mundra, "Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing", 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010)
  9. Nor Badrul Anuar, Hasimi Sallehudin, Abdullah Gani, Omar Zakari, "Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree", Malaysian Journal of Computer Science, Vol. 21(2), 2008
  10. Ahmed Patel, MonaTaghavi, KavehBakhtiyari, JoaquimCelestinoJunior,"An intrusion detection and prevention system in cloudcomputing: A systematicreview", JournalofNetworkandComputerApplications & 2012
  11. Ms Pooja Bhoria, Dr. Kanwal Garg, "Determining feature set of DOS attacks", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013 ISSN: 2277 128X
  12. Shui Yu, Wanlei Zhou, Robin Doss, Weija Jia, "Traceback of DDoS Attacks Using Entropy Variations", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 3, MARCH 2011
  13. Sharmila Wagh, Anagha Khati, Auzita Irani, Naba Inamdar, Rashmi Soni, "Effective Framework of J48 Algorithm using Semi-Supervised Approach for Intrusion Detection", International Journal of Computer Applications Volume 94 – No 12, May 2014
  14. A. S. Syed Navaz, V. Sangeetha, C. Prabhadevi, "Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud", International Journal of Computer Applications (0975 – 8887) Volume 62– No. 15, January 2013
  15. C. Almond, "A Practical Guide to Cloud Computing Security," 27 August 2009 2009.
  16. Mervat Adib Bamiah, sarfraz Nawaz Brohi, "Seven Deadly Threats and Vulnerabilities in Cloud Computing" International Journal of Advanced Engineering Sciences and Technologies, Vol No. 9, Issue No. 1, pp: 087 – 090
  17. Skoudis E. , "Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses". Prentice Hall Inc. , 2002
  18. The 1998 intrusion detection off-line evaluation plan. MIT Lincoln Lab. , Information Systems Technology Group. http://www. 11. mit. edu/IST/ideval/docs/1998/id98-eval-11. tx2, 25 March 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Attacks and Security issues in Cloud Entropy Variation J48 Algorithm KDDCUP'99 dataset Cloud Sim.