Classification of Cloud Data using Bayesian Classification
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 125 | Monthly Hits: ⮙5

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Classification of Cloud Data using Bayesian Classification

Krunal Patel, Rohit Srivastava

One of the major security challenges in cloud computing is the detection and prevention of intrusions and attacks. In order to detect and prevent malicious activities at the network layer, we propose a security framework which integrates a network intrusion detection system (NIDS) in the Cloud infrastructure. We use snort and Bayesian classifier machine learning based techniques to implement this framework. To validate our approach, we evaluate the performance and detection efficiency of our NIDS by using KDD experimental intrusion datasets. The results show that the proposed model has a higher detection rate with low false positives at an affordable computational cost

Keywords: Cloud computing, Firewall, Intrusion detection system, Snort, Bayesian Classifier

Edition: Volume 2 Issue 6, June 2013

Pages: 80 - 85

Share this Article

How to Cite this Article?

Krunal Patel, Rohit Srivastava, "Classification of Cloud Data using Bayesian Classification", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON20131090, Volume 2 Issue 6, June 2013, 80 - 85

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Cloud computing'

Downloads: 179 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 98 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 99 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 99 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'Firewall'

Downloads: 101 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙7

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

Downloads: 106 | Monthly Hits: ⮙8

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 193 - 195

Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1253 - 1257

A Trust System for SCADA Network Using Wireless Sensor Based on Node Behaviors

B.Padmini, N. Chandra Shekar Reddy, Ch. Mukunda Reddy

Share this Article

Similar Articles with Keyword 'Intrusion detection system'

Downloads: 70 | Weekly Hits: ⮙2 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙7

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

Downloads: 105 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Downloads: 106 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1954 - 1955

Internal Intrusion Detection Systems

Bhingardive Deepali R, Ranmalkar Vrushali S

Share this Article

Similar Articles with Keyword 'Snort'

Downloads: 105 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Downloads: 113 | Weekly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1209 - 1212

NICE-D: A Modified Approach for Cloud Security

Nikita T. Ramteke, Dr. Yashwant V. Chavan

Share this Article

Downloads: 115 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Share this Article

Downloads: 125 | Monthly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 80 - 85

Classification of Cloud Data using Bayesian Classification

Krunal Patel, Rohit Srivastava

Share this Article

Downloads: 132 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Similar Articles with Keyword 'Bayesian Classifier'

Downloads: 107 | Weekly Hits: ⮙2

Case Studies, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1987 - 1990

Improving Auto Bug Triage by Effective Data Reduction

Roshna V. Sangle, Rajendra D. Gawali

Share this Article

Downloads: 114 | Weekly Hits: ⮙6 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1967 - 1970

Survey on Recommender System using Distributed Framework

Sonali B. Ghodake, R. S. Paswan

Share this Article

Downloads: 116 | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1495 - 1500

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal

Share this Article

Downloads: 125 | Monthly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 80 - 85

Classification of Cloud Data using Bayesian Classification

Krunal Patel, Rohit Srivastava

Share this Article

Downloads: 129 | Weekly Hits: ⮙1 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2823 - 2828

Tamil Sign Language to Speech Translation

S. Sudha, S. Jothilakshmi, R. Rajasoundramani

Share this Article



Top