International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 153 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016


Survey: Anomaly Detection in Cloud Based Networks and Security Measures in Cloud Date Storage Applications

Dr. Chinthagunta Mukundha [2]


Abstract: Now a days in the cloud networks huge amounts of data are stored and transferred from one location to another location. The data that is transferred from one place to another is exposed to attacks. Although various techniques or applications are available to protect data, loopholes exist. Anomaly detection uses some data mining techniques to detect the surprising behavior hidden within data increasing the chances of being intruded or attacked. Various hybrid approaches have also been made in order to detect known and unknown attacks more accurately. Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of computing. Due to the increased flexibility, better reliability, great scalability and decreased costs have captivated businesses and individuals alike because of the pay-per-use form of the cloud environment. Cloud computing is a completely internet dependent technology where client data are stored and maintained in the data center of a cloud providers. The Anomaly Detection System is one of the Intrusion Detection techniques. Its an area in the cloud environment that is been developed in the detection of unusual activities in the cloud networks. Although, there are a variety of Intrusion Detection techniques available in the cloud environment, this survey paper exposes and focuses on different IDS in cloud networks through different categorizations and conducts comparative study on the security measures of Drop box, Google Drive and iCloud, to illuminate their strength and weakness in terms of security.


Keywords: Intrusion Detection, Scalability, Anomaly Detection, Cloud Computing, Security


Edition: Volume 5 Issue 3, March 2016,


Pages: 7 - 12


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Dr. Chinthagunta Mukundha, "Survey: Anomaly Detection in Cloud Based Networks and Security Measures in Cloud Date Storage Applications", International Journal of Science and Research (IJSR), Volume 5 Issue 3, March 2016, pp. 7-12, https://www.ijsr.net/get_abstract.php?paper_id=NOV161737

Similar Articles with Keyword 'Intrusion Detection'

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [18]

Share this Article

Downloads: 0

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey [8]

Share this Article
Top