CFP last date
22 April 2024
Reseach Article

Intrusion Detection and Prevention System for Cloud Simulation Environment using Hidden Markov Model and MD5

by Harsha Banafar, Sanjay Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 19
Year of Publication: 2014
Authors: Harsha Banafar, Sanjay Sharma
10.5120/15826-4490

Harsha Banafar, Sanjay Sharma . Intrusion Detection and Prevention System for Cloud Simulation Environment using Hidden Markov Model and MD5. International Journal of Computer Applications. 90, 19 ( March 2014), 6-11. DOI=10.5120/15826-4490

@article{ 10.5120/15826-4490,
author = { Harsha Banafar, Sanjay Sharma },
title = { Intrusion Detection and Prevention System for Cloud Simulation Environment using Hidden Markov Model and MD5 },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 19 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number19/15826-4490/ },
doi = { 10.5120/15826-4490 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:26.831082+05:30
%A Harsha Banafar
%A Sanjay Sharma
%T Intrusion Detection and Prevention System for Cloud Simulation Environment using Hidden Markov Model and MD5
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 19
%P 6-11
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Any activity aimed at disrupting a service or making a resource unavailable or gaining unauthorized access can be termed as an intrusion. Intrusion detection systems (IDSs) play a key role in detecting such malicious activities and enable administrators in securing network systems. The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper we have proposed new security architecture for cloud computing platform. This ensures secure communication system and hiding information from others by authentication using shared secret key MD5 and provides security using Hidden Markov Model. This structure can be easily applied with main cloud computing features, e. g. PaaS, SaaS and IaaS. Our work mainly deals with the security system of the whole cloud computing platform.

References
  1. Kawser Wazed Nafi , Tonny Shekha Kar, Sayed Anisul Hoque, Dr. M. M. A Hashem "A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture" (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2012.
  2. R Rangadurai Karthick,Vipul P. Hattiwale, Balaraman Ravindran "Adaptive Network Intrusion Detection System using a Hybrid Approach" 978-1-4673-0298-2/12/$31. 00 c 2012 IEEE.
  3. Siva S. Sivatha Sindhu , S. Geetha , A. Kannan "Decision tree based light weight intrusion detection using a wrapper approach" Expert Systems with Applications 39 (2012) journal homepsage: www. elsevier. com/locate/eswa.
  4. Sung-Bae Cho and Hyuk-Jang Park "Efficient anomaly detection by modeling privilege flows using hidden Markov model" Computers & Security Vol 22, No 1, pp 45-55, 2003
  5. Dinesha H Aand Dr. V. K Agrawal "MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES" International Journal on Cloud Computing: Services and Architecture(IJCCSA),Vol. 2, No. 3, June 2012.
  6. Md Kausar Alam, Sharmila Banu K "An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds"International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 ISSN 2250-3153 www. ijsrp. org .
  7. Mohit Marwaha, Rajeev Bedi "Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing"IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013 ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814 www. IJCSI. org.
  8. Richa Sondhiya, Maneesh Shreevastav, Mahendra Mishra "To Improve Security in Cloud Computing with Intrusion detection system using Neural Network" International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-2, May 2013.
  9. Ms. Asha. D and R. Chitra "Securing cloud from ddos attacks using intrusion detection system in virtual machine" IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320 - 8791
  10. Kashif Munir and Sellapan Palaniappan "Security Threats/Attacks Present in Cloud Environment".
  11. Flavio Lombardi, Roberto Di Pietro "Secure virtualization for cloud computing" Journal of Network and Computer Applications 34 (2011) 1113–1122.
  12. Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande "Intrusion Detection System for Cloud Computing" International Journal of Scientific & Technology Research Volume 1, Issue 4, May 2012 ISSN 2277-8616 67 IJSTR©2012
  13. Yizhang Guan, Jianghong Bao "A CP Intrusion Detection Strategy on Cloud Computing" ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA'09).
  14. Aerohive Network white paper "The Benefits of Cloud Networking" Enable cloud networking to lower IT costs & boost IT productivity
  15. Veselina Jecheva "About Some Applications of Hidden Markov Model in Intrusion Detection Systems" International Conference on Computer Systems and Technologies - CompSysTech'06
  16. Issa M. Khalil , Abdallah Khreishah and Muhammad Azeem "Cloud Computing Security: A Survey" Computers2014,3,1-35; doi:10. 3390/computers3010001 computers ISSN 2073-431X www. mdpi. com/journal/computers
  17. Andre Arnes, Fredrik Valeur, Giovanni Vigna, and Richard A. Kemmerer "Using Hidden Markov Models to Evaluate the Risks of Intrusions" System Architecture and Model Validation.
  18. Nong Ye "A Markov Chain Model of Temporal Behavior for Anomaly Detection" Proceedings of the 2000 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 6-7 June, 2000 $10. 00 © 2000 IEEE 171.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Intrusion detection and prevention system MD5 Hashing Hidden Markov Model.