Cloud computing provides large scale computing
resource to each customers. Cloud systems can be threatened by
numerous attacks as cloud provides services to no trustworthy
system. Cloud needs to contain intrusion detection system for
protecting system against threads. If IDS is having stronger
security using more rules or patterns then it need much more
computing resources. Current cloud monitoring systems can rely
on signature-based and supervised-learning-based detection
methods to check out attacks and anomalies. Propose work
introduce UCAD, an Unsupervised Cloud Anomaly Detection
for knowledge-independent detection of anomalous traffic.
UCAD uses a novel clustering technique based on Partition
based clustering to identify clusters and outliers in multiple lowdimensional
spaces. The evidence of traffic structure provided
by these multiple clustering is then combined to produce an
abnormality ranking of traffic flows, using a correlationdistance-
based approach.
Saurabh P.Taley : CSE(ESC-IV Sem) , G.H.Raisoni College of Engineering, Nagpur, Maharastra, India
J.J.Shah : Assistant prof. IT DEPARTMENT, G.H.Raisoni College of Engineering, Nagpur, Maharastra, India
Intrusion Detection System
Anomaly detection
Clustering
IDS methods leads to effective resources usages by
applying differentiated level of security strength to users
based on the degree of anomaly. Through the cloud
computing it is possible to judge all users and
administrators as potential attacker and apply strong
security policy to all traffic, but it is not efficient at all. If
any security hazards occur, economic damages are
unavoidable. proposed work Unsupervised cloud Anomaly
Detection UCAD verified the effectiveness of the system
detect real single source-destination and distributed
attacks in real traffic all in a completely blind fashion,
without assuming any particular traffic model, clustering
parameters, or even clusters structure beyond a basic
definition of what an anomaly. So it’s effective way of
detecting attacks in cloud environment.
[1] Zhen Chen*, Fuye Han, Junwei Cao, Xin Jiang, and
Shuo Chen “Cloud Computing-Based Forensic Analysis
for Collaborative Network Security Management
System” TSINGHUA SCIENCE AND TECHNOLOGY
,2013.
[2] Kapil Wankhade, Sadia Patka, Ravindra Thool “ An
Efficient Approach for Intrusion Detection Using Data
Mining Methods” 2013 IEEE
[3] En Niari Saad, Khalil El Mahdi, Mostapha Zbakh
“Cloud Computing Architectures Based IDS” 2012
IEEE.
[4] Amira Bradai and Hossam Afifi “Enforcing Trust-based
Intrusion Detection in Cloud Computing Using
Algebraic Methods” 2012.
[5] mld Khoudali, Karim Benzidane and Abderrahim
Sekkaki “Inter-VM packet inspection in Cloud
Computing ” The 5th International Conference on
Communications, Computers and Appllication 2012.
[6] Massimo Ficc o, Massimiliano Rak, and Beniamino Di
Martino “An Intrusion Detection Framework for
Supporting SLA Assessment in Cloud Computing” 2 0
12 I EEE.
[7] Matthias Gander, Basel Katt, Michael Felderer, Adrian
Tolbaru, Ruth Breu, Alessandro Moschitti “Anomaly
Detection in the Cloud: Detecting Security Incidents via
Machine Learning” 2012.
[8] Hisham A.Kholidy,Fabrizio Baiardi “DCDIDP:A
Distributed, Collaborative, and Data-driven Intrusion
Detection and Prevention Framework for Cloud
Computing Environments” 2012 IEEE.
[9] Pedro Casas, Johan Mazel and Philippe Owezarski
“UNADA: Unsupervised Network Anomaly Detection
using Sub-Space Outliers Ranking” 2011.
[10] Jun-Ho Lee,Min-Woo Park,Jung-Ho Eom, and Tai-
Myoung Chung“Multi-level Intrusion Detection System
and Log Management in Cloud Computing” 2011.
[11] Jie Yang, Yong Ge, Hui Xiong, Yingying Chen,
Hongbo Liu “Performing Joint Learning for Passive
Intrusion Detection in Pervasive Wireless Environments
” 2010.
[12] Manzoor Elahi,Kun Li,Wasif Nisar,Xinjie Lv,Hongan
Wang “Detection of Local Outlier Over Dynamic Data
Streams using Efficient Partitioning Method” 2009
[13] Baoyi Wang, Ranran Jin, Shaomin Zhang, Xiaomin
Zhao “Research on Gravity-based Anomaly Intrusion
Detection Algorithm” 2009.
[14] HU Liang, REN Wei-wu, REN Fei “Anomaly Detection
using Improved Hierarchy Clustering” 2009.
[15] Yu-Ping Zhou, Jian-An Fang , Yu-Ping Zhou
“Research on Neuro-Fuzzy Inference System in
Hierarchical Intrusion Detection”2009.