Towards Privacy Preserving Cooperative Cloud Based Intrusion Detection Systems

Towards Privacy Preserving Cooperative Cloud Based Intrusion Detection Systems
Author :
Publisher :
Total Pages :
Release :
ISBN-10 : OCLC:1232478289
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis Towards Privacy Preserving Cooperative Cloud Based Intrusion Detection Systems by : Anirudh Mitreya Kothapalli

Download or read book Towards Privacy Preserving Cooperative Cloud Based Intrusion Detection Systems written by Anirudh Mitreya Kothapalli and published by . This book was released on 2020 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: Cloud systems are becoming more sophisticated, dynamic, and vulnerable to attacks. Therefore, it's becoming increasingly difficult for a single cloud-based Intrusion Detection System (IDS) to detect all attacks, because of limited and incomplete knowledge about attacks and their implications. The recent works on cybersecurity have shown that a co-operation among cloud-based IDSs can bring higher detection accuracy in such complex computer systems. Through collaboration, cloud-based IDSs can consult and share knowledge with other IDSs to enhance detection accuracy and achieve mutual benefits. One fundamental barrier within cooperative IDS is the anonymity of the data the IDS exchanges. Malicious IDS can obtain sensitive information from other IDSs by inferring from the observed data. To address this problem, we propose a new framework for achieving a privacy-preserving cooperative cloud-based IDS. Specifically, we design a unified framework that integrates privacy-preserving techniques into machine learning-based IDSs to obtain privacy-aware cooperative IDS. Therefore, this allows IDS to hide private and sensitive information in the shared data while improving or maintaining detection accuracy. The proposed framework has been implemented by considering several machine learning and privacy-preserving techniques. The results suggest that the consulted IDSs can detect intrusions without the need to use the original data. The results (i.e., no records of significant degradation in accuracy) can be achieved using the newly generated data, similar to the original data semantically but not synthetically.


Towards Privacy Preserving Cooperative Cloud Based Intrusion Detection Systems Related Books

Towards Privacy Preserving Cooperative Cloud Based Intrusion Detection Systems
Language: en
Pages:
Authors: Anirudh Mitreya Kothapalli
Categories:
Type: BOOK - Published: 2020 - Publisher:

DOWNLOAD EBOOK

Cloud systems are becoming more sophisticated, dynamic, and vulnerable to attacks. Therefore, it's becoming increasingly difficult for a single cloud-based Intr
Cybersecurity in Intelligent Networking Systems
Language: en
Pages: 148
Authors: Shengjie Xu
Categories: Computers
Type: BOOK - Published: 2023-01-24 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy a
Privacy Preserving Data Mining
Language: en
Pages: 146
Authors: Jaideep Vaidya
Categories: Computers
Type: BOOK - Published: 2005-11-29 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Privacy preserving data mining implies the "mining" of knowledge from distributed data without violating the privacy of the individual/corporations involved in
Security Engineering for Cloud Computing: Approaches and Tools
Language: en
Pages: 258
Authors: Rosado, David G.
Categories: Computers
Type: BOOK - Published: 2012-09-30 - Publisher: IGI Global

DOWNLOAD EBOOK

"This book provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services
Fog/Edge Computing For Security, Privacy, and Applications
Language: en
Pages: 417
Authors: Wei Chang
Categories: Computers
Type: BOOK - Published: 2021-01-04 - Publisher: Springer Nature

DOWNLOAD EBOOK

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applica