Intrusion Detection Using Data Mining in Cloud Computing Environment
Published: 2018
Author(s) Name: Pinki Sharma, Jyotsna Sengupta and P K Suri |
Author(s) Affiliation: Research Scholar, Department of Computer Science, Punjabi University, Patiala, Punjab, India.
Locked
Subscribed
Available for All
Abstract
Nowadays cloud computing is widely accepted a paradigm. At present large amount of data is transferred between cloud and user and vice-versa. That data in transient is exposed to various intrusions. Therefore, security is the primary concern of cloud computing environment. Firewall and other security techniques can act as first line of defence and cannot provide a robust security solution. Intrusion detection systems proved to be best solutions to various attacks. Data mining techniques have emerged to make it less vulnerable and thus to analyze data and to determine various kind of attack. Both signatures based and anomaly based techniques effectively and efficiently used data mining techniques for any kind of attack detection. This paper presents various data mining techniques used in intrusion detection. This paper also reviews various cloud intrusion detection systems that uses data mining techniques for attack detection.
Keywords: Cloud computing, Cloud intrusion detection systems, Data mining, IDS, Intrusion detection.
View PDF