INTRUSION DEFENSE MECHANISM USING ARTIFICIAL IMMUNE SYSTEM IN CLOUD COMPUTING (CLOUD SECURITY USING COMPUTATIONAL INTELLIGENCE)

Authors

  • Santhanalakshmi L School of Computing Science and Engineering, VIT University, Chennai Campus, Chennai, Tamil Nadu, India
  • Sakkaravarthi R School of Computing Science and Engineering, VIT University, Chennai Campus, Chennai, Tamil Nadu, India

DOI:

https://doi.org/10.22159/ajpcr.2017.v10s1.19602

Keywords:

Artificial immune system, Cloud security, Computational intelligence

Abstract

Cloud is a general term used in organizations that host various service and deployment models. As cloud computing offers everything a service,
it suffers from serious security issues. In addition, the multitenancy facility in the cloud provides storage in the third party data center which is considered to be a serious threat. These threats can be faced by both self-providers and their customers. Hence, the complexity of the security should be increased to a great extend such that it has an effective defense mechanism. Although data isolation is one of the remedies, it could not be a total solution. Hence, a complete architecture is proposed to provide complete defense mechanism. This defense mechanism ensures that the threats are blocked before it invades into the cloud environment. Therefore, we adopt the mechanism called artificial immune system which is derived from biologically inspired computing. This security strategy is based on artificial immune algorithm.

 

Downloads

Download data is not yet available.

References

Available from: http://www.en.wikipedia.org/wiki/Cloud_Computing.

Sangkatsanee P, Wattanapongsakorn N, Charnsripinyo C. Practical realtime intrusion detection using machine learning approaches. Comput Commun 2011;34(8):2227-35.

Elshoush HT. Alert correlation in collaborative intelligent intrusion detection systems-a survey. Appl Softw Comput 2011;11:4349-65.

Kuzhalisai M, Gayathri G. Enhanced security in cloud with multilevel intrusion detection system. Int J Comput Commun Technol 2012;3(3):66-9.

Modi C, Patel D, Borisanya B, Patel A, Rajarajan M. A novel framework for intrusion detection in cloud. ACM, International Conference on Security of Information and Networks; 2012. p. 67-74.

Zarrabi A. Internet intrusion detection system service in a cloud. Int J Comput Sci 2012;9(5):308-15.

Gonzalez N, Miers C. Top threats to cloud computing. A quantitative analysis of current security concerns and solutions for cloud computing.Cloud Security Alliance; 2012.

Tanase M. The Future of IDS; 2001. Available from: http://www. securityfocus.com/infocus/1520.

Debar H, Becker M, Siboni D. A neural network component for an intrusion detection system. In: Proceedings. IEEE Computer Society Symposium; 1992. p. 240-50.

Available from: http://www.nvd.nist.gov/CVSS/v2-calculator#score.

Yan X, De-ming Z. Research on network security evaluation based on fuzzy method. Meas Control Technol 2009;28(2):79-82.

Dongmei Z, Yuqing Z, Jianfeng MA. Fuzzy Risk Assessment of Entropy Weight Coefficient Method Applied in Network Security; 1997.

Prowell S, Kraus R, Borkin M. Seven Deadliest Network Attacks. 1st ed. Burlington: Syngress Publishers; 2010.

Shun-Chieh L, Tseng SS. Constructing detection knowledge for DDoS intrusion tolerance. Int J Expert Syst Appl 2004;27(3):379-90.

Leland WE, Taqqu MS, Willinger W, Wilson DV. On the self-similar nature of ethernet traffic (extended version). IEEE/ACM Trans Netw 1994;2(1):1-15.

Jose N. Politically motivated denial of service attacks. In: Czosseck C, Geers K, editors. The Virtual Battlefield: Perspectives on Cyber Warfare. Amsterdam: IOS Press; 2009. p. 163-81.

Segura V, Lahuerta J. Modeling the economic incentives of DDoS attacks: Femtocell case study. In: Economics of Information Security and Privacy. US: Springer US Publishers; 2010. p. 107-19.

Published

01-04-2017

How to Cite

L, S., and S. R. “INTRUSION DEFENSE MECHANISM USING ARTIFICIAL IMMUNE SYSTEM IN CLOUD COMPUTING (CLOUD SECURITY USING COMPUTATIONAL INTELLIGENCE)”. Asian Journal of Pharmaceutical and Clinical Research, vol. 10, no. 13, Apr. 2017, pp. 153-7, doi:10.22159/ajpcr.2017.v10s1.19602.

Issue

Section

Original Article(s)