Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks

Nowadays, it is very important to maintain a high level security to ensure safe and trusted communication of information between various organisations. But secured data communication over the Internet and any other network is always under threat of intrusions and misuses. So intrusion detection system (IDS) has become a needful component in terms of computer and network security. In this research, the authors have intended to propose an effective method for text data based IDS and secure data storage. In the proposed preprocessing steps, the input text document is preprocessed and then change to the desired format. Next the resultant output is fed to the IDS. Here user text data is checked; whether the given data is normal or intrusive based on a modified artificial neural network (MANN). Here traditional neural network is modified by means of modified particle swarm optimisation. The final process of the authors’ proposed method is to encrypt the file using dual encryption algorithms (RSA and AES). To improve the storage security of the proposed method, steganography techniques are utilised after the dual encryption. Their proposed system is implemented with the help of Cloud simulator in the working platform Java.

References

    1. 1)
      • 19. Singh, R., Kumar, H., Singla, R.K.: ‘On the designing of two grains levels network intrusion detection system’, J. Karbala Int. J. Mod. Sci., 2015, 1, (1), pp. 1525.
    2. 2)
      • 20. Ravale, U., Marathe, N., Padiya, P.: ‘Feature selection based hybrid anomaly intrusion detection system using K means and RBF kernel function’, Procedia Comput. Sci., 2015, 45, pp. 428435.
    3. 3)
      • 14. Moghaddam, F.F., Moghaddam, S.G., Rouzbeh, S., et al: ‘A scalable and efficient user authentication scheme for cloud computing environments’. Proc. of IEEE Region of Symp., 2014, pp. 508513.
    4. 4)
      • 2. Naidu, N., Dharaskar, R.V.: ‘An effective approach to network intrusion detection system using genetic algorithm’, Int. J. Comput. Appl., 2010, 1, (3), pp. 2632.
    5. 5)
      • 12. Zainal, A., Maarof, M.A., Shamsuddin, S.M.: ‘Research issues in adaptive intrusion detection’. Proc. of the 2nd Postgraduate Annual Research Seminar (PARS'06), Faculty of Computer Science & Information Systems, Universiti Teknologi Malaysia, 2006, pp. 2425.
    6. 6)
      • 8. Cha, B., Park, K., Seo, J.: ‘Neural networks techniques for host anomaly intrusion detection using fixed pattern transformation’. ICCSA 2005, 2005, (LNCS, 3481), pp. 254263.
    7. 7)
      • 16. Zarrabi, A., Zarrabi, A.: ‘Internet intrusion detection system service in a cloud’, Int. J. Comput. Sci., 2012, 9, (5), pp. 308315.
    8. 8)
      • 25. Chiba, Z., Abghour, N., Moussaid, K., et al: ‘A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection’, Comput. Secur., 2018, 75, pp. 3658.
    9. 9)
      • 9. Adetunmbi, A.O., Falaki, S.O., Adewale, O.S., et al: ‘Network intrusion detection based on rough set and k-nearest neighbour’, Int. J. Comput. ICT Res., 2008, 2, (1), pp. 6066.
    10. 10)
      • 15. Anil Kumar, K.S., Nanda Mohan, V.: ‘Novel anomaly intrusion detection using neuro-fuzzy inference system’, IJCSNS Int. J. Comput. Sci. Netw. Secur., 2008, 8, (8), pp. 611.
    11. 11)
      • 22. Hajimirzaei, B., Navimipour, N.J.: ‘Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm’, ICT Express, 2018, pp. 16.
    12. 12)
      • 5. Campos, M.M., Milenova, B.L.: ‘Creation and deployment of data mining-based intrusion detection systems in oracle database l0 g’. Proc. Fourth Int. Conf. on Machine Learning and Applications, 2005, p. 8.
    13. 13)
      • 11. Farid, D.M., Rahman, M.Z.: ‘Anomaly network intrusion detection based on improved self adaptive Bayesian algorithm’, J. Comput., 2010, 5, (1), pp. 2331.
    14. 14)
      • 28. Anitha Ruth, J., Sirmathi, H., Meenakshi, A.: ‘Steganography based secure data storage and intrusion detection for cloud computing using signcryption and artificial neural network’, Res. J. Appl. Sci., Eng. Technol., 2016, 13, (5), pp. 354364.
    15. 15)
      • 6. Sarmah, A.: ‘Intrusion detection systems: definition, need and challenges’, White Paper from SANS Institute, 2001.
    16. 16)
      • 17. Mathew, S., Jose, A.P.: ‘Securing cloud from attacks based on intrusion detection system’, Int. J. Adv. Res. Comput. Commun. Eng.’, 2012, 1, (10), pp. 753759.
    17. 17)
      • 31. Adedeji Kazeem, B., Akinlolu, P.: ‘A new hybrid data encryption and decryption technique to enhance data security in communication networks: algorithm development’, Int. J. Sci. Eng. Res., 2014, 5, (10), pp. 804811.
    18. 18)
      • 18. Singh, R., Kumar, H., Singla, R.K.: ‘An intrusion detection system using network traffic profiling and online sequential extreme learning machine’, Expert Syst. Appl., 2015, 42, (22), pp. 86098624.
    19. 19)
      • 7. Kozushko, H.: ‘Intrusion detection: host-based and network-based intrusion detection systems’, White Paper from Independent Study, September 11, 2003.
    20. 20)
      • 30. Guo, C., Ping, Y., Liu, N., et al: ‘A two-level hybrid approach for intrusion detection’, Neuro Comput., 2016, 214, pp. 391400.
    21. 21)
      • 1. Yao, J.T., Zhao, S.L., Saxton, L.V.: ‘A study on fuzzy intrusion detection’. Data Mining, Intrusion Detection, Information Assurance and Data Networks Security, 2005, Vol. 5812, pp. 2331.
    22. 22)
      • 26. Iqbal, S., Kiah, M.L.M., Dhaghighi, B., et al: ‘On cloud security attacks: a taxonomy and intrusion detection and prevention as a service’, J. Netw. Comput. Appl., 2016, 74, pp. 98120.
    23. 23)
      • 13. Sahu, V., Dubey, B.: ‘An analysis of current security issues and solutions for cloud computing’, Int. J. Res. Appl. Sci. Eng. Technol. (Ijras Et), 2014, 2, pp. 365372.
    24. 24)
      • 21. Jiang, R., Wu, X., Bhargava, B.: ‘SDSS-MAC: secure data sharing scheme in multi-authority cloud storage systems’, J. Comput. Secur., 2016, 62, pp. 193212.
    25. 25)
      • 10. Network- Vs. Host-Based Intrusion Detection: A Guide to Intrusion Detection’, White Paper from ISS Internet Security Systems, Atlanta, GA, October 2, 1998.
    26. 26)
      • 23. Mazini, M., Shirazi, B., Mahdavi, I.: ‘Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms’, J. King Saud Univ. Comput. Inf. Sci., 2018, pp. 113.
    27. 27)
      • 3. Allen, J., Christie, A., Fithen, W.: ‘State of the practice of intrusion detection technologies’, Technical Report, CMU/SEI-99-TR-028, 2000.
    28. 28)
      • 29. Hoque, M.S., Mukit, M., Bikas, M., et al: ‘An implementation of intrusion detection system using genetic algorithm’, Int. J. Netw. Secur.Appl. (IJNSA), 2012, 4, (2), pp. 109120.
    29. 29)
      • 27. Pitchaiah, M., Daniel, P.: ‘Implementation of advanced encryption standard algorithm’, Int. J. Sci. Eng. Res., 2012, 3, (3), pp. 16.
    30. 30)
      • 4. Dasarathy, B.V.: ‘Intrusion detection’, Inf. Fusion, 2003, 4, (4), pp. 243245.
    31. 31)
      • 24. Pandeeswari, N., Kumar, G.: ‘Anomaly detection system in cloud environment using fuzzy clustering based ANN’, Mobile Netw. Appl., 2016, 21, (3), pp. 494505.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2018.5295
Loading

Related content

content/journals/10.1049/iet-ifs.2018.5295
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address