Open Access   Article Go Back

Anomaly Detection and Categorization in Cloud Environment using Deep Learning Techniques

Nidhi Thakkar1 , Miren Karamta2 , Seema Joshi3 , M. B. Potdar4

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 211-214, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.211214

Online published on May 31, 2019

Copyright © Nidhi Thakkar, Miren Karamta, Seema Joshi, M. B. Potdar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nidhi Thakkar, Miren Karamta, Seema Joshi, M. B. Potdar, “Anomaly Detection and Categorization in Cloud Environment using Deep Learning Techniques,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.211-214, 2019.

MLA Style Citation: Nidhi Thakkar, Miren Karamta, Seema Joshi, M. B. Potdar "Anomaly Detection and Categorization in Cloud Environment using Deep Learning Techniques." International Journal of Computer Sciences and Engineering 7.5 (2019): 211-214.

APA Style Citation: Nidhi Thakkar, Miren Karamta, Seema Joshi, M. B. Potdar, (2019). Anomaly Detection and Categorization in Cloud Environment using Deep Learning Techniques. International Journal of Computer Sciences and Engineering, 7(5), 211-214.

BibTex Style Citation:
@article{Thakkar_2019,
author = {Nidhi Thakkar, Miren Karamta, Seema Joshi, M. B. Potdar},
title = {Anomaly Detection and Categorization in Cloud Environment using Deep Learning Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {211-214},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4224},
doi = {https://doi.org/10.26438/ijcse/v7i5.211214}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.211214}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4224
TI - Anomaly Detection and Categorization in Cloud Environment using Deep Learning Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Nidhi Thakkar, Miren Karamta, Seema Joshi, M. B. Potdar
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 211-214
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
387 301 downloads 154 downloads
  
  
           

Abstract

Cloud computing is a paradigm that allows on-demand network access to a shared pool of configurable and reliable computing resources to cloud customers in pay-per-use, fashion. Despite the existence of such merits, there are Security issues such as data integrity, users’ confidentiality, and service availability because of its open and distributed architecture that place restrictions on the use of cloud computing. A preventive approach is to identify such issues and eliminate before it can cause the serious impact to the cloud users. Nowadays, Intrusion Detection Systems (IDSs) are the most widely used method to detect attacks on cloud. Recently, learning-based techniques for security applications are gaining popularity in the literature with the emergence in machine learning. A deep learning is a novel approach to detect cloud threats. The existing Cloud IDSs suffer from low detection accuracy and a high false positive rate. In this research, proposed solution will use deep learning algorithm to improve the effectiveness of our proposed solution. Furthermore, the comparisons with other deep learning algorithm to demonstrate the effectiveness of our proposed solution are given.

Key-Words / Index Term

Cloud Security, Network Intrusion Detection System, Deep Learning

References

[1] Mehmood, Yasir, et al. "Intrusion detection system in cloud computing: challenges and opportunities." 2013, IEEE.
[2] Idhammad, Mohamed, Karim Afdel, and Mustapha Belouch. "Distributed intrusion detection system for cloud environments based on data mining techniques." Procedia Computer Science 127 (2018): 35-41.
[3] Hamid, Yasir, M. Sugumaran, and LudovicJournaux. "Machine learning techniques for intrusion detection: a comparative analysis." Proceedings of the International Conference on Informatics and Analytics. ACM, 2016.
[4] Haq, Nutan Farah, et al. "Application of machine learning approaches in intrusion detection system: a survey." IJARAI-International Journal of Advanced Research in Artificial Intelligence 4.3 (2015): 9-18.
[5] Dhanabal, L., and S. P. Shantharajah. "A study on NSL-KDD dataset for intrusion detection system based on classification algorithms." International Journal of Advanced Research in Computer and Communication Engineering 4.6 (2015): 446-452.
[6] Buczak, Anna L., and ErhanGuven. "A survey of data mining and machine learning methods for cyber security intrusion detection." IEEE Communications Surveys & Tutorials 18.2 (2016): 1153-1176.
[7] Nguyen, Khoi Khac, et al. "Cyberattack detection in mobile cloud computing: A deep learning approach." 2018 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2018.
[8] Van, Nguyen Thanh, Tran Ngoc Thinh, and Le Thanh Sach. "An anomaly-based network intrusion detection system using deep learning." 2017 International Conference on System Science and Engineering (ICSSE). IEEE, 2017.
[9] Feng, Fang, et al. "Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device." Ad Hoc Networks 84 (2019): 82-89.
[10] Shone, Nathan, et al. "A deep learning approach to network intrusion detection." IEEE Transactions on Emerging Topics in Computational Intelligence 2.1 (2018): 41-50.
[11] Kwon, Donghwoon, et al. "A survey of deep learning-based network anomaly detection." Cluster Computing (2017): 1-13.
[12] Aldwairi, Tamer, Dilina Perera, and Mark A. Novotny. "An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection." Computer Networks 144 (2018): 111-119.
[13] Almseidin, Mohammad, et al. "Evaluation of machine learning algorithms for intrusion detection system." Intelligent Systems and Informatics (SISY), 2017 IEEE 15th International Symposium on. IEEE, 2017.
[14] Haque, MdEnamul, and Talal M. Alkharobi. "Adaptive hybrid model for network intrusion detection and comparison among machine learning algorithms." International Journal of Machine Learning and Computing 5.1 (2015): 17.
[15] Ahmed, Mohiuddin, AbdunNaser Mahmood, and Jiankun Hu. "A survey of network anomaly detection techniques." Journal of Network and Computer Applications 60 (2016): 19-31.
[16] Liu, Qiang, et al. "A survey on security threats and defensive techniques of machine learning: a data driven view." IEEE access 6 (2018): 12103-12117.
[17] Kwon, Donghwoon, et al. "A survey of deep learning-based network anomaly detection." Cluster Computing (2017): 1-13.
[18] Belavagi, Manjula C., and BalachandraMuniyal. "Performance evaluation of supervised machine learning algorithms for intrusion detection." Procedia Computer Science 89 (2016): 117-123.
[19] Shanmugavadivu, R., and N. Nagarajan. "Network intrusion detection system using fuzzy logic." Indian Journal of Computer Science and Engineering (IJCSE) 2.1 (2011): 101-111.
[20] Shone, Nathan, et al. "A deep learning approach to network intrusion detection." IEEE Transactions on Emerging Topics in Computational Intelligence 2.1 (2018): 41-50.
[21] Park, Kinam, Youngrok Song, and Yun-Gyung Cheong. "Classification of Attack Types for Intrusion Detection Systems Using a Machine Learning Algorithm." 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (Big Data Service). IEEE, 2018.
[22] https://en.wikipedia.org/wiki/Deep_learning