Classification of Cloud Data using Bayesian Classification
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Classification of Cloud Data using Bayesian Classification

Krunal Patel, Rohit Srivastava

One of the major security challenges in cloud computing is the detection and prevention of intrusions and attacks. In order to detect and prevent malicious activities at the network layer, we propose a security framework which integrates a network intrusion detection system (NIDS) in the Cloud infrastructure. We use snort and Bayesian classifier machine learning based techniques to implement this framework. To validate our approach, we evaluate the performance and detection efficiency of our NIDS by using KDD experimental intrusion datasets. The results show that the proposed model has a higher detection rate with low false positives at an affordable computational cost

Keywords: Cloud computing, Firewall, Intrusion detection system, Snort, Bayesian Classifier

Edition: Volume 2 Issue 6, June 2013

Pages: 80 - 85

Share this Article

How to Cite this Article?

Krunal Patel, Rohit Srivastava, "Classification of Cloud Data using Bayesian Classification", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON20131090, Volume 2 Issue 6, June 2013, 80 - 85

70 PDF Views | 61 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Bird's Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Similar Articles with Keyword 'Firewall'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2990 - 2992

A Review on an Improving Firewall Performance by Eliminating Redundancies in Access Control Lists (ACL)

Priyanka Padole, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1253 - 1257

A Trust System for SCADA Network Using Wireless Sensor Based on Node Behaviors

B.Padmini, N. Chandra Shekar Reddy, Ch. Mukunda Reddy

Share this Article

Similar Articles with Keyword 'Intrusion detection system'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1215 - 1218

Review on Intrusion Detection Using Fuzzy ARTMAP with Feature Selection Technique

Swati Sonawale, Roshani Ade

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2631 - 2633

Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks

Mr. Naveed Zishan, Ashwini Meshram

Share this Article

Similar Articles with Keyword 'Snort'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1209 - 1212

NICE-D: A Modified Approach for Cloud Security

Nikita T. Ramteke, Dr. Yashwant V. Chavan

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 80 - 85

Classification of Cloud Data using Bayesian Classification

Krunal Patel, Rohit Srivastava

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Similar Articles with Keyword 'Bayesian Classifier'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1967 - 1970

Survey on Recommender System using Distributed Framework

Sonali B. Ghodake, R. S. Paswan

Share this Article

Case Studies, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1987 - 1990

Improving Auto Bug Triage by Effective Data Reduction

Roshna V. Sangle, Rajendra D. Gawali

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1495 - 1500

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2823 - 2828

Tamil Sign Language to Speech Translation

S. Sudha, S. Jothilakshmi, R. Rajasoundramani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1550 - 1553

A Comparative Study of Machine Learning Algorithms applied to Predictive Breast Cancer Data

Kedar Potdar, Rishab Kinnerkar

Share this Article
Top