Cloud Computing Security aspects: Threats, Countermeasures and Intrusion Detection using Support Vector Machine
Main Article Content
Abstract
The Cloud Computing concept has witnessed immense growth, and the rationale behind this increased interest in the emerging paradigm is the cost-effective transmission, storage and intensive computation. The idea is to render remote storage and data analysis capability to the end-user using shared computing resources, thereby bringing down the total cost incurred for an individual. However, consumers are still reluctant to adopt this technology due to associated security and privacy concerns. This manuscript presents a comprehensive description of various threats and technical security concerns with respect to cloud computing. Additionally, support vector machine was used to detect intrusion on the NSL-KDD dataset designed by DARPA. The accuracy of the algorithm for DoS and probe attack were analyzed, and the results are represented in the form of confusion matrices. Among the 41 attributes of the NSL-KDD dataset, only 24 significant attributes are selected. We observed that our model could predict a DoS attack with an accuracy of 96% and a probe attack with an accuracy of 84%.
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.