An Efficient Virtual Machine Intrusion Detection System on Cloud Computing

Authors(2) :-Sathiya Dharani K, Akilandeswari K

As Cloud Computing is the rapidly growing field of IT. Cloud Computing is defined as an Internet based computing in which virtually shared servers that is data centers provide software, platform, infrastructure, policies and many resources. In this research we have analyzed, the various intrusion log files of virtual machines in order to identify the significant features for creation of intrusion model. In this research we have used logistic regression classification algorithm. Through this algorithm we have achieved the highest accuracies with low false positive rate.

Authors and Affiliations

Sathiya Dharani K
Department of Computer Science, SJSV CAS, Coimbatore, Tamil Nadu, India
Akilandeswari K
Department of Computer Science, SJSV CAS, Coimbatore, Tamil Nadu, India

Raspb Theory Vortex Gravitation, Cosmology and Cosmogony. Celestial Mechanics

  1. Ghosh, P., Bardhan, M., Chowdhury, N. R., & Phadikar, S. (2017). IDS Using Reinforcement Learning Automata for Preserving Security in Cloud Environment. International Journal of Information System Modeling and Design (IJISMD), 8(4), 21-37.
  2. Gupta, D., & Gupta, S. (2017, October). An efficient approach of trigger mechanism through IDS in cloud computing. In Electrical, Computer and Electronics (UPCON), 2017 4th IEEE Uttar Pradesh Section International Conference on (pp. 68-72). IEEE.
  3. Deshpande, P., Sharma, S. C., Peddoju, S. K., & Junaid, S. (2018). HIDS: A host based intrusion detection system for cloud computing environment. International Journal of System Assurance Engineering and Management, 9(3), 567-576.
  4. Baraka, H. B., & Tianfield, H. (2014, September). Intrusion detection system for cloud environment. In Proceedings of the 7th International Conference on Security of Information and Networks (p. 399). ACM.
  5. Singh, D., Patel, D., Borisaniya, B., & Modi, C. (2016). Collaborative ids framework for cloud. International Journal of Network Security, 18(4), 699-709.
  6. Damopoulos, D., Kambourakis, G., & Portokalidis, G. (2014, April). The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones. In Proceedings of the Seventh European Workshop on System Security (p. 6). ACM (2) please write your biography and academic details.

Publication Details

Published in : Volume 2 | Issue 1 | January-February 2019
Date of Publication : 2019-01-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 143-146
Manuscript Number : SHISRRJ192125
Publisher : Shauryam Research Institute

ISSN : 2581-6306

Cite This Article :

Sathiya Dharani K, Akilandeswari K, "An Efficient Virtual Machine Intrusion Detection System on Cloud Computing", Shodhshauryam, International Scientific Refereed Research Journal (SHISRRJ), ISSN : 2581-6306, Volume 2, Issue 1, pp.143-146, January-February.2019
URL : https://shisrrj.com/SHISRRJ192125

Article Preview