International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Classification of Cloud Data using Bayesian Classification

Krunal Patel, Rohit Srivastava

One of the major security challenges in cloud computing is the detection and prevention of intrusions and attacks. In order to detect and prevent malicious activities at the network layer, we propose a security framework which integrates a network intrusion detection system (NIDS) in the Cloud infrastructure. We use snort and Bayesian classifier machine learning based techniques to implement this framework. To validate our approach, we evaluate the performance and detection efficiency of our NIDS by using KDD experimental intrusion datasets. The results show that the proposed model has a higher detection rate with low false positives at an affordable computational cost

Keywords: Cloud computing, Firewall, Intrusion detection system, Snort, Bayesian Classifier

Edition: Volume 2 Issue 6, June 2013

Pages: 80 - 85


How to Cite this Article?

Krunal Patel, Rohit Srivastava, "Classification of Cloud Data using Bayesian Classification", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON20131090, Volume 2 Issue 6, June 2013, 80 - 85

29 PDF Views | 25 PDF Downloads

Download Article PDF

Video Lecture of Above Article is Not Available Yet

You be the First to Request! Press the Button below!



Similar Articles with Keyword 'Cloud computing'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1453 - 1457

A Social Compute Cloud: For Sharing Resources

Surjimol R

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1485 - 1487

NICE A: Implementation with Active Intrusion Detection System

Rasika R. Pawar, Mrunalinee Patole

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1074 - 1077

A Secure and Efficient Way of Accessing Encrypted Cloud Databases Using Adaptive Encryption Scheme

Seethal K S, Siddana Gowda

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1572 - 1576

Comparison of Advanced Optimization Algorithm for Task Scheduling in Cloud Computing

S. Gunasekaran, S. Sonialpriya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1582 - 1586

Switching of Cloud Resources among IPTV Services for Better Utilization

Ravi Bhillu Jadhav, Nirmala Y Bariker

Share this article

Similar Articles with Keyword 'Firewall'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2065 - 2069

Preventing Cache Based Side-Channel Attacks for Security in Cloud over Virtual Environment

S. Vengadesan, B. Muthulakshmi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2885 - 2889

An Efficient Privacy Preserving Scheme over Encrypted Data in Cloud

Kirti Panmand, Sandeep Kadam

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1006 - 1010

Policy Optimization and Anomaly Detection of Firewall

Akshay Dattatray Kachare, Geeta Atkar

Share this article

Similar Articles with Keyword 'Intrusion detection system'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1485 - 1487

NICE A: Implementation with Active Intrusion Detection System

Rasika R. Pawar, Mrunalinee Patole

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1051 - 1054

An Efficient Network Intrusion Based on Decision Tree Classifier & K-Mean Clustering using Dimensionality Reduction

Vandna Malviya, Anurag Jain

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this article

Similar Articles with Keyword 'Snort'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1209 - 1212

NICE-D: A Modified Approach for Cloud Security

Nikita T. Ramteke, Dr. Yashwant V. Chavan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 80 - 85

Classification of Cloud Data using Bayesian Classification

Krunal Patel, Rohit Srivastava

Share this article

Similar Articles with Keyword 'Bayesian Classifier'

Case Studies, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1987 - 1990

Improving Auto Bug Triage by Effective Data Reduction

Roshna V. Sangle, Rajendra D. Gawali

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1550 - 1553

A Comparative Study of Machine Learning Algorithms applied to Predictive Breast Cancer Data

Kedar Potdar, Rishab Kinnerkar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1495 - 1500

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1967 - 1970

Survey on Recommender System using Distributed Framework

Sonali B. Ghodake, R. S. Paswan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2823 - 2828

Tamil Sign Language to Speech Translation

S. Sudha, S. Jothilakshmi, R. Rajasoundramani

Share this article

Top