Abstract
The cutting edge technology cloud provides services for end users based on pay-as-use model. Cloud computing can provide immense services like unlimited storage capacity, huge computing power, availability of Web services for organizations. Organizations can avail these services as and when required and pay for these services as per their utilization. In this endeavour, the security aspect of cloud services has been discussed. For this, the existing Honeynet system is modified using deep learning approach. In this manuscript, it is made intelligent enough to identify the potential threat and makes the cloud system robust from the DDoS attack. Experimental result has been shown to lay bare with the effectiveness of the proposed system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Buyya, R., Vecchiola, C., Selvi, T.S.: Mastering Cloud Computing, 1st edn., pp. 1.1–1.10. McGraw Hill Education, India (2013)
Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy, 3rd edn., pp. 35–71. Shroff Publishers & Distributors Pvt. Ltd., India (2011)
Nepal, S., Pathan, M.: Editorial international journal of cloud computing. Inderscience 1(213), 101–118 (2012)
Carlin, A., Hammoudeh, M., Aldabbas, O.: Defence for distributed denial of service attacks in cloud computing. In: Proceedings of the International Conference on Advanced Wireless, Information and Communication Technologies (AWICT 2015), Elsevier, pp. 490–497 (2015)
Karnwal, T., et al.: A comber approach to protect cloud computing against XML DDos and HTTP DDoS attack. In: 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science, pp. 1–5 (2012)
Lanjuan, Y., et al.: Defense for DDoS attack for cloud computing. In: 2012 IEEE International Conference on Computer Science and Automation Engineering (CASE), pp. 626–629 (2012)
Joshi, B., et al.: Securing cloud computing environment against DDoS attacks. In: 2012 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5 (2012)
Fujinoki, H.: Dynamic binary user-splits to protect cloud servers from DDoS attacks. Presented at the Proceedings of the Second International Conference on Innovative Computing and Cloud Computing, Wuhan, China (2013)
Rani, R., Vasta, A.K.: CARD (continuous and random dropping) based DRDOS attack detection and prevention techniques in MANET. Int. J. Eng. Technol. 2(8), 1449–1456 (2012)
Kramer, L., Krupp, J., Makita, D., et al.: AmpPot: monitoring and defending against amplification DDoS attacks. In: Proceedings of the International Workshop on Recent Advances in Intrusion Detection, Kyoto, Japan, pp. 615–636. Springer, Cham, 2–4 November 2015
Weiler, N.: Honeypots for distributed denial-of-service attacks. In: Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2002), Pittsburgh, PA, pp. 109–114. IEEE, New York, 12 June 2002
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, S.B., Mukherjee, K., Dwivedi, R.K. (2020). Secured Cloud System Using Deep Learning. In: Das, A., Nayak, J., Naik, B., Dutta, S., Pelusi, D. (eds) Computational Intelligence in Pattern Recognition. Advances in Intelligent Systems and Computing, vol 1120. Springer, Singapore. https://doi.org/10.1007/978-981-15-2449-3_42
Download citation
DOI: https://doi.org/10.1007/978-981-15-2449-3_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2448-6
Online ISBN: 978-981-15-2449-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)