Efficient approaches for intrusion detection in cloud environment

Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Tupakula

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

9 Citations (Scopus)

Abstract

Intrusion Detection System is one of the challenging research areas in Cloud Security. Security incidents such as Denial of service, scanning, malware code injection, virus, worm and password cracking are becoming common in cloud environment. These attacks can become a threat to the reputation of the company and can also cause financial loss if not detected on time. Hence securing the cloud from these types of attacks is very important. In this paper, we have proposed techniques to secure cloud environment by incorporating some of the efficient approaches in intrusion detection. We have focused on two major issues in IDS: efficient detection mechanism and speed of detection. We have proposed approaches to tackle these issues using Machine Learning and parallelization. We have also provided security frameworks to demonstrate how these approaches will be deployed in Cloud Environment. A preliminary analysis was conducted for some of the approaches and results are promising.

Original languageEnglish
Title of host publicationProceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016
EditorsParma Nand Astya, Abhishek Swaroop, Vishnu Sharma, Manjeet Singh
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages1211-1216
Number of pages6
ISBN (Electronic)9781509016662
DOIs
Publication statusPublished - 10 Jan 2017
Event2016 IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 - Greater Noida, India
Duration: 29 Apr 201630 Apr 2016

Other

Other2016 IEEE International Conference on Computing, Communication and Automation, ICCCA 2016
Country/TerritoryIndia
CityGreater Noida
Period29/04/1630/04/16

Keywords

  • Cloud
  • Intrusion Detection System
  • Machine Learning
  • Parallelization

Fingerprint

Dive into the research topics of 'Efficient approaches for intrusion detection in cloud environment'. Together they form a unique fingerprint.

Cite this