Research Article | Open Access | Download PDF
Volume 46 | Number 1 | Year 2017 | Article Id. IJETT-V46P202 | DOI : https://doi.org/10.14445/22315381/IJETT-V46P202
Data Leakage Detection in Cloud Computing Network
Utkarsh, Vaibhav Gupta, Yashwant Kumar Singh, Dr. Shashi Kant Singh
Citation :
Utkarsh, Vaibhav Gupta, Yashwant Kumar Singh, Dr. Shashi Kant Singh, "Data Leakage Detection in Cloud Computing Network," International Journal of Engineering Trends and Technology (IJETT), vol. 46, no. 1, pp. 6-11, 2017. Crossref, https://doi.org/10.14445/22315381/IJETT-V46P202
Abstract
Giving security in a conveyed framework requires more than client verification with passwords or advanced testaments and classification in information transmission. Dispersed model of cloud makes it defenseless and inclined to modern disseminated interruption assaults like Distributed Denial of Service (DDOS) and Cross Site Scripting (XSS). To deal with extensive scale arrange get to movement and regulatory control of information and application in cloud, another multi-strung disseminated cloud IDS demonstrate has been proposed. Our proposed cloud IDS handles huge stream of information bundles, break down them and create reports effectively by incorporating learning and conduct investigation to recognize interruptions.
Keywords
Cross Site Scripting, Cloud, DDOS, IDS.
References
[1] SEBASTIAN ROSCHKE, FENG CHENG, CHRISTOPH MEINEL,“ INTRUSION DETECTION IN THE CLOUD", EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 2009.
[2] CHI-CHUN LO, CHUN-CHIEH HUANG, JOY KU, “A COOPERATIVE INTRUSION DETECTION SYSTEM FRAMEWORK FOR CLOUD COMPUTING NETWORKS", 39TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, 2010.
[3] ANDREAS HAEBERLEN,“ AN EFFICIENT INTRUSION DETECTION MODEL BASED ON FAST INDUCTIVE LEARNING”, SIXTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, HONG KONG, 19-22 AUGUST 2007.
[4] RICHARD CHOW, PHILIPPE GOLLE, MARKUS JAKOBSSON, “CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL”, ACM COMPUTER AND COMMUNICATIONS SECURITY WORKSHOP, CCSW 09, NOVEMBER 13, 2009.
[5] KLEBER, SCHULTER, “INTRUSION DETECTION FOR GRID AND CLOUD COMPUTING”, IEEE JOURNAL: IT PROFESSIONAL, 19 JULY 2010.
[6] IRFAN GUL, M. HUSSAIN, “DISTRIBUTED CLOUD INTRUSION DETECTION MODEL”, INTERNATIONAL JOURNAL OF ADVANCED SCIENCE AND TECHNOLOGY VOL. 34, SEPTEMBER, 2011.