IDEAS home Printed from https://ideas.repec.org/a/igg/jiit00/v11y2015i4p1-15.html
   My bibliography  Save this article

A Novel Cloud Intrusion Detection System Using Feature Selection and Classification

Author

Listed:
  • Anand Kannan

    (Department of ICT, KTH University, Stockholm, Sweden)

  • Karthik Gururajan Venkatesan

    (Department of ICT, KTH University, Stockholm, Sweden)

  • Alexandra Stagkopoulou

    (Department of ICT, KTH University, Stockholm, Sweden)

  • Sheng Li

    (Department of ICT, KTH University, Stockholm, Sweden)

  • Sathyavakeeswaran Krishnan

    (Department of IT, Uppsala University, Uppsala, Sweden)

  • Arifur Rahman

    (Department of WNE, Linköping University, Linköping, Sweden)

Abstract

This paper proposes a new cloud intrusion detection system for detecting the intruders in a traditional hybrid virtualized, cloud environment. The paper introduces an effective feature selection algorithm called Temporal Constraint based on Feature Selection algorithm and also proposes a classification algorithm called hybrid decision tree. This hybrid decision tree has been developed by extending the Enhanced C4.5 algorithm an existing decision tree based classifier. Furthermore, the experiments conducted on the sample Cloud Intrusion Detection Datasets (CIDD) show that the proposed cloud intrusion detection system provides better detection accuracy than the existing work and reduces the false positive rate.

Suggested Citation

  • Anand Kannan & Karthik Gururajan Venkatesan & Alexandra Stagkopoulou & Sheng Li & Sathyavakeeswaran Krishnan & Arifur Rahman, 2015. "A Novel Cloud Intrusion Detection System Using Feature Selection and Classification," International Journal of Intelligent Information Technologies (IJIIT), IGI Global, vol. 11(4), pages 1-15, October.
  • Handle: RePEc:igg:jiit00:v:11:y:2015:i:4:p:1-15
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJIIT.2015100101
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jiit00:v:11:y:2015:i:4:p:1-15. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.