A Hierarchical Intrusion Detection System for Clouds: Design and Evaluation

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Entropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

A hierarchical SOM-based intrusion detection system

An approach to network intrusion detection is investigated, based purely on a hierarchy of SelfOrganizing Feature Maps. Our principle interest is to establish just how far such an approach can be taken in practice. To do so, the KDD benchmark dataset from the International Knowledge Discovery and Data Mining Tools Competition is employed. Extensive analysis is conducted in order to address the ...

متن کامل

Model - Based Intrusion Detection System Design and Evaluation

Eighteen years after the original Internet worm of 1988, software still suffers from vulnerabilities that allow attackers to gain illicit access to computer systems. Attackers exploit vulnerabilities to hijack control of a process’ execution as a means to access or alter a system as they desire. In this dissertation, we argue that model-based anomaly detectors can retrofit efficient attack dete...

متن کامل

Model-based Intrusion Detection System Design And Evaluation

The proposed model has an anomaly based IDS with an adaptive learning the KDD DAPRA dataset which was designed for network IDS evaluation. The following network design diagram is for detecting distributed denial service attacks. An Intrusion Detection System (IDS) is a software application or device that monitors the Here, trained model consists of big datasets with distributed storage Performa...

متن کامل

entropy based fuzzy rule weighting for hierarchical intrusion detection

predicting different behaviors in computer networks is the subject of many data mining researches. providing a balanced intrusion detection system (ids) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Cloud Computing: Services and Architecture

سال: 2012

ISSN: 2231-6663

DOI: 10.5121/ijccsa.2012.2601