Reference Hub9
IDS Using Reinforcement Learning Automata for Preserving Security in Cloud Environment

IDS Using Reinforcement Learning Automata for Preserving Security in Cloud Environment

Partha Ghosh, Meghna Bardhan, Nilabhra Roy Chowdhury, Santanu Phadikar
Copyright: © 2017 |Volume: 8 |Issue: 4 |Pages: 17
ISSN: 1947-8186|EISSN: 1947-8194|EISBN13: 9781522513803|DOI: 10.4018/IJISMD.2017100102
Cite Article Cite Article

MLA

Ghosh, Partha, et al. "IDS Using Reinforcement Learning Automata for Preserving Security in Cloud Environment." IJISMD vol.8, no.4 2017: pp.21-37. http://doi.org/10.4018/IJISMD.2017100102

APA

Ghosh, P., Bardhan, M., Chowdhury, N. R., & Phadikar, S. (2017). IDS Using Reinforcement Learning Automata for Preserving Security in Cloud Environment. International Journal of Information System Modeling and Design (IJISMD), 8(4), 21-37. http://doi.org/10.4018/IJISMD.2017100102

Chicago

Ghosh, Partha, et al. "IDS Using Reinforcement Learning Automata for Preserving Security in Cloud Environment," International Journal of Information System Modeling and Design (IJISMD) 8, no.4: 21-37. http://doi.org/10.4018/IJISMD.2017100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud computing relies on sharing computing resources. With high availability and accessibility of resources, cloud computing is under the threat of major cyber-attacks. To detect attacks and preserve security in cloud environment, having an efficient intrusion detection system (IDS) is required. In this article, an effective and efficient IDS is proposed to maintain high level security of data in cloud. The authors have incorporated Reinforcement Learning Automata with their proposed IDS while detecting and classifying attacks. Using learning automata an effective rule set is generated with the proposed algorithm from vast training set to improve the learning process at reduced computation cost and time. After which, the proposed reinforcement learning algorithm helps in classification of attacks accurately using the reinforcement signal. This proposed model was experimented with NSL-KDD as well as KDD 10% dataset and have proved its robustness by detecting attacks more accurately being an IDS.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.