Skip to main content

Secured Cloud System Using Deep Learning

  • Conference paper
  • First Online:
Computational Intelligence in Pattern Recognition

Abstract

The cutting edge technology cloud provides services for end users based on pay-as-use model. Cloud computing can provide immense services like unlimited storage capacity, huge computing power, availability of Web services for organizations. Organizations can avail these services as and when required and pay for these services as per their utilization. In this endeavour, the security aspect of cloud services has been discussed. For this, the existing Honeynet system is modified using deep learning approach. In this manuscript, it is made intelligent enough to identify the potential threat and makes the cloud system robust from the DDoS attack. Experimental result has been shown to lay bare with the effectiveness of the proposed system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Buyya, R., Vecchiola, C., Selvi, T.S.: Mastering Cloud Computing, 1st edn., pp. 1.1–1.10. McGraw Hill Education, India (2013)

    Chapter  Google Scholar 

  2. Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy, 3rd edn., pp. 35–71. Shroff Publishers & Distributors Pvt. Ltd., India (2011)

    Google Scholar 

  3. Nepal, S., Pathan, M.: Editorial international journal of cloud computing. Inderscience 1(213), 101–118 (2012)

    Article  Google Scholar 

  4. Carlin, A., Hammoudeh, M., Aldabbas, O.: Defence for distributed denial of service attacks in cloud computing. In: Proceedings of the International Conference on Advanced Wireless, Information and Communication Technologies (AWICT 2015), Elsevier, pp. 490–497 (2015)

    Article  Google Scholar 

  5. Karnwal, T., et al.: A comber approach to protect cloud computing against XML DDos and HTTP DDoS attack. In: 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science, pp. 1–5 (2012)

    Google Scholar 

  6. Lanjuan, Y., et al.: Defense for DDoS attack for cloud computing. In: 2012 IEEE International Conference on Computer Science and Automation Engineering (CASE), pp. 626–629 (2012)

    Google Scholar 

  7. Joshi, B., et al.: Securing cloud computing environment against DDoS attacks. In: 2012 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5 (2012)

    Google Scholar 

  8. Fujinoki, H.: Dynamic binary user-splits to protect cloud servers from DDoS attacks. Presented at the Proceedings of the Second International Conference on Innovative Computing and Cloud Computing, Wuhan, China (2013)

    Google Scholar 

  9. Rani, R., Vasta, A.K.: CARD (continuous and random dropping) based DRDOS attack detection and prevention techniques in MANET. Int. J. Eng. Technol. 2(8), 1449–1456 (2012)

    Google Scholar 

  10. Kramer, L., Krupp, J., Makita, D., et al.: AmpPot: monitoring and defending against amplification DDoS attacks. In: Proceedings of the International Workshop on Recent Advances in Intrusion Detection, Kyoto, Japan, pp. 615–636. Springer, Cham, 2–4 November 2015

    Chapter  Google Scholar 

  11. Weiler, N.: Honeypots for distributed denial-of-service attacks. In: Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2002), Pittsburgh, PA, pp. 109–114. IEEE, New York, 12 June 2002

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuntal Mukherjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, S.B., Mukherjee, K., Dwivedi, R.K. (2020). Secured Cloud System Using Deep Learning. In: Das, A., Nayak, J., Naik, B., Dutta, S., Pelusi, D. (eds) Computational Intelligence in Pattern Recognition. Advances in Intelligent Systems and Computing, vol 1120. Springer, Singapore. https://doi.org/10.1007/978-981-15-2449-3_42

Download citation

Publish with us

Policies and ethics