Main Article Content
The Cloud Computing concept has witnessed immense growth, and the rationale behind this increased interest in the emerging paradigm is the cost-effective transmission, storage and intensive computation. The idea is to render remote storage and data analysis capability to the end-user using shared computing resources, thereby bringing down the total cost incurred for an individual. However, consumers are still reluctant to adopt this technology due to associated security and privacy concerns. This manuscript presents a comprehensive description of various threats and technical security concerns with respect to cloud computing. Additionally, support vector machine was used to detect intrusion on the NSL-KDD dataset designed by DARPA. The accuracy of the algorithm for DoS and probe attack were analyzed, and the results are represented in the form of confusion matrices. Among the 41 attributes of the NSL-KDD dataset, only 24 significant attributes are selected. We observed that our model could predict a DoS attack with an accuracy of 96% and a probe attack with an accuracy of 84%.
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.