CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

A Novel Approach for Intrusion Detection and Prevention Technique for Cloud based on FVM Approach

by Rameshwari Malik, Pramod Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 1
Year of Publication: 2015
Authors: Rameshwari Malik, Pramod Kumar
10.5120/20710-3029

Rameshwari Malik, Pramod Kumar . A Novel Approach for Intrusion Detection and Prevention Technique for Cloud based on FVM Approach. International Journal of Computer Applications. 118, 1 ( May 2015), 20-24. DOI=10.5120/20710-3029

@article{ 10.5120/20710-3029,
author = { Rameshwari Malik, Pramod Kumar },
title = { A Novel Approach for Intrusion Detection and Prevention Technique for Cloud based on FVM Approach },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 1 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number1/20710-3029/ },
doi = { 10.5120/20710-3029 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:30.484931+05:30
%A Rameshwari Malik
%A Pramod Kumar
%T A Novel Approach for Intrusion Detection and Prevention Technique for Cloud based on FVM Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 1
%P 20-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing visualize as the next generation computing technique for Information technology due to advantages provided by this technology. Cloud computing solutions are scalable, advanced and low cost. Its nature is distributed as cloud, it is indefensible to a large category of attacks are very frequent. Security is major challenge in cloud computing . This paper proposed the creation of FVM(forensic virtual machine ) so that each virtual machine can be used as different security issue and which security issue have high probability can be classified using Bayesian classifier . An intrusion detection system proposed for monitoring the network against malicious attack . In this paper malicious attacks divided into three major categories first FVM used for detect unauthorized access, second used for malicious nodes and third one for IDS activity.

References
  1. J. Mchugh, A. Christie, and J. Allen, "Defending Yourself: The Role of Intrusion Detection Systems", IEEE Software, Volume 17, Issue 5, Sep. -Oct. , pp. 42-51, 2000.
  2. K . V . S . N . R . Rao , A. Pal, and M. R. Patra, "A Service Oriented Architectural Design for Building Intrusion Detection Systems", International Journal of Recent Trends in Engineering, vol. 1, no. 2, pp. 11-14, 2009.
  3. E – Banking - Appendix B : Glossary , http : // www . ffiec . gov / ffiecinfobase / booklets / e_banking/ ebanking_04_appx_b_glossary. html, Accessed on: 23/02/2012
  4. Information Technology at Johns Hopkins – Glossary G-I, http://www. it. jhmi. edu /glossary /ghi . html , Accessed on: 23/02/2012
  5. K . Hwang , M . Cai , Y . Chen , S . Member , and M . Qin, "Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes", IEEE transactions on dependable and secure computing, vol. 4, no. 1, pp. 1-15, 2007.
  6. P. Jain, D. Rane, and S. Patidar, "A Survey and analysis of Cloud Model-Based Security for Computing Secure Cloud Bursting and Aggregation in Renal Environment ", IEEE 2011 World Congress on Information and Communication Technologies, pp. 456-461, 2011.
  7. Z . Mahmood, " Cloud Computing: Characteristics and Deployment Approaches", 11th IEEE International Conference on Computer and Information Technology, pp. 121-126, 2011.
  8. L. Shaw, BehzadBordbar, John Saxon, Keith Harrison, Chris I. Dalton. Forensic Virtual Machines: Dynamic defence in the Cloud via Introspection Accessing. IEEE International Conference on Cloud Engineering. 2014,UK
  9. Robert John(UK), Saeed M. AlqahtaniMaqbool(UK) , Al Balushi(Oman). An Intelligent Intrusion Prevention System for Cloud Computing (SIPSCC). International Conference on Computational Science and Computational Intelligence,2014
  10. Monica Nicoli, Stefano Savazzi, Francesca Carminati, Michele Riva, A Bayesian Approach to Device-Free Localisation: Modeling and Experimental Assessment, IEEE Journal Of Selected Topics In Signal Processing, VOL. 8, February 2014
  11. Shubhashis Sengupta , Vikrant Kaulgud, Vibhu Saujanya Sharma, Cloud Computing Security - Trends and Research, : IEEE World Congress on Services,2011
  12. Jun Ho Lee , Min Woo Park , jung Ho Eom , Tai Myoung Chung,Multi level Intrusion Detection System and Log Management in Cloud Computing, IEEE publishing 2011.
  13. Rui Xia, ChengqingZong, Shoushan Li, Ensemble of feature sets and classification algorithms for sentiment classification, Information sciences 2011
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing IDS Bayesian classifier SVM