Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Intrusion Detection Techniques for Mobile

Cloud Computing in Heterogeneous 5g


#
Ishu Chawla, #Oshin Vinayak, #Suman Singh
#
Department of Information Technology, Institute of Information Technology & Management, Janakpuri, New Delhi-110058
chawlaishu1@gmail.com, vinayakoshin@gmail.com, sumansingh09@gmail.com

Abstract — As the importance of distributed The paper shows safety concerns in MCC and
computers is rapidly growing, they are becoming combines latest attainments all together in intrusion
the target of more and more crime. Intrusion may detection abilities so that the approaches can be
be defined as the set of attempts to compromise found which can successfully deploy the rise in
computer network security. Besides the several heterogeneous 5G. As Intrusion Detection System
security services, Intrusion Detection (IDS) is a vital authority that has been related with
System/Techniques are taken into point that various techniques. As each technique has different
strengthen the system security and is more property therefore each observation process has both
powerful in preventing internal and external prevalence and restrictions. The major benefactions
attacks. This technique is considered to be very of this paper are bifold:
efficient in preventing wireless communication in  It allocates 5G users of future and
Fifth Generation. In this paper we will discuss developers with an analytical efficient
what Mobile Cloud Computing is and various model to attain safe data communication.
Intrusion Detection Techniques for mobile
computing along with challenges faced by each  It analysis and integrates all critical safety
technique. concerns in MCC from a technical aspect.

II. MOBILE CLOUD COMPUTING


Keywords - Intrusion, Mobile Cloud Computing, TERMINOLOGY IN FIFTH GENERATION
Intrusion Detection System/Techniques. A. MOBILE CLOUD COMPUTING
I. INTRODUCTION To extend cloud to the edge of the networks, one
The latest fast growth of advanced mobile of the cloud service models, MOBILE CLOUD
technologies led to a great advantage in the COMPUTING is fast emerging. It consists of
development of mobile cloud computing (MMC). various mobile devices that are useful for many
Mobile devices performance has enhanced by users. A prediction was made by Gartner that by
incorporating three technologies in which the first 2013, PCs will be overtaken by mobile phones as
one to be involved is cloud computing, second is the most common web access devices,
mobile internet and third is mobile computing in worldwide [1]. Mobile Cloud Computing mainly
which choosing MCC has become main advantage. tells how the resources of cloud can be best
Taking into consideration, Fifth Generation (5G) utilized by smart phones to reduce its
background in the coming time, MCC will achieve consumption of energy. And a particular task can
greater class performances in unloading computation be executed either on mobile device or can be
by relocating data storage and processing data to the sent to cloud. Overhead tradeoffs between
cloud so that the abilities of the mobile devices can communication and computation, decides where
be enhanced [4-7] by the cause of improved to execute the task. One of the most important
bandwidth. Though, lot of provocations will be features is that the data processing and data
faced by advanced wireless networks [8, 9], that has storage are migrated from mobile devices to
been investigated from different aspect by earlier cloud. With this feature, to support applications
research [10]. Out of which one of the provocations running in cloud MCC model is designed that
is that controlling risk from intrusions is not easy offers high level centralized functions. If we talk
because of managing tool limitations, mutual about security in MCC model, the security
interferences between signal cells, high efficiency problems can be addressed by threat assessment
wireless communications, intentional attacks and from three technologies- Mobile Internet, Cloud
improper user authentications. The intrusions are Computing and Mobile Computing [2]. This
concealed by attackers with the help of enhanced model also helps in reducing obstacles that are
networking speed. related to security (reliability and privacy),
performance and environment.

103
Volume 11, Issue 1 ∙January-June 2020
defined as any software that makes itself
available on internet and uses a standardized
1. MOBILE COMPUTING messaging system known as XML. It can also
To enable devices that are portable, to access the be defined as consolidation of web
services available on the web, a platform known as applications by using Simple Object Access
Mobile Computing is developed that is supported by
wireless networks. It is a technology in which Protocol, Extensible Markup Language, Web
without being connected to a fixed physical link, we Services Description Language and Universal
can transmit data, video and voice via any wireless Description, Discovery and Integration. The
device. It involves the following: security criteria and requirements may vary
a. Mobile Hardware: To receive and access in mobile internet. Therefore, they often
the service of mobility, Mobile devices or address service layer objects such as
components comes in this category such as, application, platform and infrastructure layer.
tablet PCs, portable laptops, smartphones, It doesn’t matter which layer is choose,
etc. These devices are capable of sending wireless network itself always faces threats
and receiving signals at the same time. from intrusion.
b. Mobile Communication: To ensure that
seamless and reliable communication goes 3. BEHIND CLOUD COMPUTING
on, mobile communication is an Cloud computing have some technologies
infrastructure that is put in place for the that are similar to the deployments or service
same. For example, services, portal, types[10,11].Basically, there are three
protocols and bandwidth necessary to technologies that are adopting the cloud
support the services. It ensures that the computing with the Mass Distributed
other systems that offers the same service, Storage(MDS) virtualization and the
does not collide. technology that are under the Parallel
c. Mobile Software: It is the actual program Programming Model(PPM)[12-15].Cloud
that runs on the mobile hardware. It is the computing used service deployment
operating system of appliance. It deals with technology that are provided by
the demands and characteristics of mobile virtualization. The main advantages of the
applications. It is the most essential virtualization was that distributing the
component used to operate mobile devices. resources among multiple levels of
It is useful in reducing application’s service[16,17] with the help of object
development time. When communication takes virtualization that are network, storage, data,
place, it also faces threats. For example, one of physical machine and servers[18].If the levels
the threats is when using virtual private of service are explained only then the virtual
network, the wireless communication can be machine are capable of delivering the
easily invaded because of interconnection of services of the system to the end users.
various networks. Authentication and Virtual machine also capable for describing
encryption methods are used for security in the information in a proper way and represent
mobile computing for virtual private network the resources in a set of entities that are logic-
access. related for the end-users [19-21]. Virtual
machine provide some application that are
2. MOBILE INTERNET isolated in nature to the end-users with the
The method of accessing browser based functionality of the virtualized system and
Internet services from mobile devices, such that application are running on the operating
as smartphones, through wireless networks is system. By using the Virtual machine the cost
referred to as mobile internet. It is a of resources are reduced for the end-users,
technology derived from development of saved the usage of energy and provide the
wireless networks. Some recent technologies easiest path for the maintenances of
that are active, includes: Third Generation system[22-24].The main function of Virtual
(3G), Mobile Commerce (M-commerce), machine are independent in nature and
WiFi and long term evolution. The future provided the isolated platform to the users
asset for mobile internet is 5G. The central system component and protect the
idea of mobile internet is to connect two information of users from the
communicators that support Web services, attackers[25,26].Attackers provided the
via wireless network. Web services may be controls of the Virtual machine in the context

104 IITM Journal of Management and IT


of the networking by attacking the B. HETEROGENEOUS FIFTH GENERATION
provisioning and configuration module that NETWORKS
are used for the formation of lowest layer that A heterogeneous network is considered as a
are reside on the hypervisor in cloud[27].The wireless network that are used for the connection
nature of the Virtual machine are dynamic so of portal devices with different operating systems
that it provide the level of difficulty to and describe the explanation of the integrated
control the security of the system. Due to the network to the end-users. Heterogeneous
nature of Virtual machine, the vulnerability network provide some protocols without any
problem of manufactures. Heterogeneous
of the system are also increased [28].By network are also called mixture-style network
reducing the overhead of virtualization and that are used in the recently wireless area which
reliability of system, Lin et al [29] proposed a support the advanced mobile broadcast
technique that are used and supported the services[49].In mobile broadcast services, new
features of the hardware so that the style of spectrums are used for increasing the
performance of the Virtual machine easily compatibility and provided the fashionable
improvement to the network performance. These
improved that are known as hybrid
spectrums required long time for providing the
virtualization. MDS technology are used for goal of the current methods [32]. Now focus on
storing the data in different storage servers the previous information of the heterogeneous
for protecting the loss of data from any kinds data in network, some features can be predicted
of disaster. MDS is a technique that are used for the future data of heterogeneous 5G of
for increasing the infrastructure efficiency network in the context of mobile. The first one
and data reliability by using the different and was introduced the explanation of the
heterogeneous 5G that are used for improving
distributed application and storage servers.
the performance of the future devices. Mobile
For setup the connection of the distributed cloud have heterogeneous network that provided
multiple services, the interconnection among solution for improving the performance of
the heterogeneous network are used in network management and saved the energy usage
MCC[30].Some storage devices are available trade-off[33].For improving the network
as infrastructure that are the major security management broadly, a technique are used such
concern for the users in MCC.MDS are used as leveraging distributed. These technique have
the capacity to increase the 5G dramatically.
as a wireless technique among multiple Heterogeneous network are also used for the
location that are responsible for the end-users so that they can easily switch network
infrastructure’s changes. But this technique between the latest one 5G, 4G and the WIFI that
provided many problems such as are concern the security and the
disconnecting the servers, supplied incorrect interoperability[34].There are many problem for
signals and network management chaos. For adopting the MCC that is interferences and
standardization among the networks and provide
reducing these problems, MDS provide
the intrusion properties with the attackers. There
technique to the end-user such as cloud base are some current intrusion detection technique
services [30].PPM is a technique that are that are used for the context of advanced wireless
commonly known as cloud based solution network.
and solved the problem of synchronous tasks
by accepting the parallel data processing.
This technique are used for drilling the tasks
into multiple number of small tasks so that III. INTRUSION DETECTION SYSTEMS
the tasks can easily solved in minimal time. Intrusion may be defined as the set of attempts to
For solving the problem of large sized compromise computer network security. Besides the
several security services, Intrusion Detection
information, parallel programming model
System/Techniques are taken into point that
was the best approach [31]. In the above strengthen the system security and is more powerful
description of the techniques are considered in preventing internal and external attacks. Intrusion
as a fundamental unit of cloud that are can also be defined as an attack which can occur in
designed for the solution and the security any situation. Some tasks handled by IDS are
concern. Now there are various section have a. It prevents and mitigates the damage caused
the knowledge about the heterogeneous by intrusion.
network that are used for providing the b. It identifies the activity that can cause a
platforms of networking to the cloud more serious attack.
computing. c. It identifies the attack perpetrator.
d. It discovers new attack patterns.

105
Volume 11, Issue 1 ∙January-June 2020
Some requirements that the IDS follow to fulfill its detection(PHAD) and second technique
tasks include completeness, accuracy, performance, called network traffic anomaly
timeliness and fault tolerance. detection(NETAD)[46].The limitations of
IDS is classified into 5 categories: these two technique are prevented by using
a. Detection based on Anomaly (ABD) the two components of detection such as
b. Detection based on Signatures (SBD) misuse and anomaly. These two major
c. Hybrid Intrusion Detection components are designed by using the
random forest algorithm [47]. These two
d. Stateful Protocol Analysis Detection
techniques are designed on the bases of IDS
(SPAD) which are used for the open sources
e. Detection based on Specifications (SPBD) assignment[48].The main aim of hybrid
intrusion technique to increase the accuracy
of the detection and decreasing the
A. DETECTION METHODOLOGIES complexity of the network system[49].The
hybrid intrusion detection technique are also
This part includes the description of techniques, used for enhancing the performance of the
concepts, limitations and deployments of various wireless network and designed the
IDSs including ABD, SBD, hybrid intrusion hierarchical structure of network[50].The
detection, SPAD and SPBD approaches. main drawback of the hybrid intrusion
detection was that in these it is difficult to
1. SIGNATURE BASED DETECTION AND combine the different types of detection
APPROACH techniques. In these multiple techniques are
This technique is also known as Misuse come to perform the tasks at the same time
Detection. It depends on the known patterns that’s why the workload of the packets are
of unauthorized behavior [35]. It comprises increase.
of storing the signature profiles that identifies
patterns that are associated with network 3. ANOMALY-BASED DETECTION AND
intrusions in signature database and generates APPROACH
some rules that are based on signature This system is an intrusion detection system
profiles. The data packets that are transmitted which helps in detecting both network as well
on the network with their corresponding as computer intrusions and misapply by
classification rules are classified on the basis monitoring system activity and categorizing
of these generated rules. The intrusion it normal or anomalous. The categorization is
patterns or strings on the database that are based on rules instead of signatures or
pre-installed, SDB depends on that. If SDB patterns, and trying to identify any kind
system is not updated, the signatures will not misapply that comes from normal system
be detected that results in decrease of its operation. The ABD system represents an
performance. Since the intrusions are approach of recognizing obvious separation
dynamic, the IDS using SBD may not or unpredictability in the events and
identify new threats when connected to transmissions [51, 52-54]. The collation if
internet. This problem can be solved by there is any separation in the usual and
deploying an automated signature creator that unfamiliar deportment and this unfamiliar
is attached to this system [36, 37]. By deportment is observed to be dynamic or
collecting and analyzing the constituents of possible assault, which rely on the amount
consistent behaviors, these signature creators distinctness. There are three major techniques
can be generated [38, 39]. But this solution sustaining collations which contain
has also a limitation that the latest algorithms mathematical-based [55], fact-based, and
cannot completely detect all malicious machine knowledge-based techniques
instances. Due to the excess load of packets [56,57].
on network, the performance is deducted Mathematical-based (also referred as
when the processing capability cannot match statistical-based) technique: This technique
the wireless transmission ability [40]. This route each and every traffics and creates a
can be solved if the data storage and description which analyzes if there might any
processing can be moved to cloud and by kind of inappropriate traffic by a
examining the parallel signature matching on mathematical examination [58]. The
cloud based servers [41]. problems for implementing mathematical-
based technique are bifold. First, placing an
2. HYBRID INTRUSION DETECTION actual stability between good or bad
Different types of intrusion depend on the deportment is difficult. Second, if the system
security that are requested by the users is being assaulted this technique may get
[42,43,44,45].This type of intrusion detection failed.
are the combination of the two techniques Fact-based technique: It is a kind of computer
that are called packet header anomaly program that make use of knowledge base to

106 IITM Journal of Management and IT


resolve complicated problems. This security purpose. The main aim of the
technique is relevant to those systems that authentication was to ensure that the identities of
have distinct knowledge structures or the user was matched with the help of
connected to set of rules [58], like symbolic mechanisms of the authentication and randomly
representation. checked that the user request are forward to the
Machine learning-based technique: Machine parties with the appropriate password [64]. The
learning is a branch of computer science that mechanisms for testing the identities of the user
provides computers the potential to know is called biometric. The biometric mechanisms of
without being precisely programmed. In the authentication checked the identities such as
machine knowledge-based technique, [57,58] password (eye detection, finger prints etc.),
latest deportment models which are based on behavior of the given characteristics [65-67].
the considerations of events, events, and This mechanism are used for the protection of
activities are built. the access user and supported by the password
verification technique. This technique forward
4. SPECIFICATION-BASED DETECTION the data and the user information to the access
AND APPROACH user that are authentication for the data and
When compared with Anomaly-based create the privacy of data during the
detection, SPBD has almost identical mode communication of the wireless network.
for perceiving divergence but wants users to
set up a behavior consideration level in a
particular-requirement formation [60]. The IV. CONCLUSION AND FUTURE WORK
stimulation for practicing SPBD system is to
achieve excessive level of abilities in This technologies of the networking are designed for
recognizing recent attacks and improving the benefits of the user with the help of MCC and
perfection. The SPDB approach is observed 5G heterogeneous network. IDS technique are used
as a suitable result to inspecting the variable- for the protection of the wireless networking
extent patterns [61]. Although, identical to communication with the help of protection the
other ABD systems, the SPBD system too transmission of user data. This review paper discuss
needs a large number of tasks for determining about the techniques of wireless network that are
used for the communication and gave the outcomes
normal behavioral specifications.
based on the some achievements such as MCC, IDS
and the 5G heterogeneous network. For securing the
5. STATEFUL PROTOCOL ANALYSIS AND
high level communication of the wireless 5G,
APPROACH
introduced the framework that are based on the
The idea of stateful protocol analysis is basic
cloud intrusion detection techniques.
to put stateful properties together to regular
protocol analysis. The SPAD access of Based on these review paper, there are some
incursion investigation that differentiate questions that are introduced for the future work.
inconsistent conclusions from regular courses
in a period purchasing a preset global profile (1)How to solve the problem of security with the
[62]. The profile supply ultimate users with help of Cloud based IDS?
an account of protected and reliable activity (2)If we generate some model such as energy aware
definitions. While performing the SPAD both model, how to fulfill the usage of the 5G
the Datagram Protocol (UDP) as well as heterogeneous network for the mobile cloud
Transmission Control Protocol (TCP) will be computing?
assessed. [63]. This respective technique has
the major absolute property which is (3)How we can explain the transmission of secure
supplying evaluation with stateful properties. data between the cloud based IDS and the users?
In spite that the SPAD proposes powerful
protocol analyses, there are two restrictions
in practice. Furthermore, the difficulties of REFERENCES
detecting assaults based on a particular
request or retaliation are not fully fixed by 1. Huang, D. (2011). Mobile cloud
that technique. Inscribing these difficulties, computing. IEEE COMSOC Multimedia
additional stateful properties required to be
Communications Technical Committee
sum up with t the protocol analysis profile,
which coincidentally claims large tasks and (MMTC) E-Letter.
massive packets. 2. Intrusion detection techniques for mobile
cloud computing in heterogeneous 5G Keke
B. USER AUTHENTICATION
Gai1, Meikang Qiu1 *, Lixin Tao1 and
For the security, the high level of password are Yongxin Zhu2.
generated for the authentication’s user. If the
password of the user does not match then the
user cannot get their information due to the

107
Volume 11, Issue 1 ∙January-June 2020
3. Kumar K, Lu Y. Cloud computing for Physics Procedia. Elsevier: Beijing, China,
mobile users: can offloading computation 2012.
save energy? Computer 2010. 16. Messaoud E HB, Diouri O. Web service
4. Shiraz M, Gani A, Khokhar RH, Buyya R. security: overview, analysis and challenges.
A review on distributed application International Journal of Computer Science
processing frameworks in smart mobile Issues 2014.
devices for mobile cloud computing. 17. Ma Z, Sheng Z, Gu L. DVM: a big virtual
5. Miettinen AP, Nurminen JK. Energy machine for cloud computing. IEEE
efficiency of mobile clients in cloud Transactions on Computers 2013.
computing, Proceedings of the 2nd 18. Zhang S, Yan H, Chen X. Research on key
USENIX Workshop on Hot Topics in technologies of cloud computing. In
Cloud Computing, Boston, MA, 2010. Physics Procedia. Elsevier: Beijing, China,
6. Simoens P, Turck FD, Dhoedt B, 2012.
Demeester P. Remote display solutions for 19. Ma Z, Sheng Z, Gu L. DVM: a big virtual
mobile cloud computing. IEEE Internet machine for cloud computing. IEEE
Computing 2011. Transactions on Computers 2013.
7. Qiu M, Su H, Chen M, Ming Z, Yang LT. 20. Luo Y. Network I/O virtualization for cloud
Balance of security strength and energy for computing. IT Professional Magazine 2010.
a PMU monitoring system in smart grid. 21. Chaudhary D, Chhillar RS. Reverse host
IEEE Communications Magazine 2012. allocation approach for virtual machine
8. Qiu M, Gao W, Chen M, Niu J, Zhang L. cloud computing environment. International
Energy efficient security algorithm for Journal of Computer Applications 2013.
power grid wide area monitoring system. 22. Langer SG, French T. Virtual machine
IEEE Transactions on Smart Grid 2011. performance benchmarking. Journal of
9. Qiu M, Zhang L, Ming Z, Chen Z, Qin X, Digital Imaging 2011.
Yang LT. Security-aware optimization for 23. Bright PP, Bijolin EE. Energy efficient
ubiquitous computing systems with SEAT virtual machine monitoring architecture for
graph approach. Journal of Computer and green cloud computing. International
System Sciences 2013. Journal of Computer Applications 2013.
10. Hu F, Qiu M, Li J, Grant T, Taylor D, 24. Lovsz G, Niedermeier F, Meer HD.
McCaleb S, et al. A review on cloud Performance tradeoffs of energy-aware
computing: design challenges in virtual machine consolidation. Cluster
architecture and security. Journal of Computing 2013.
Computing and Information Technology 25. Zhang F, Chen H. Security-preserving live
2011. migration of virtual machine in the cloud.
11. Gai K, Li S. Towards cloud computing: a Journal of Network and Systems
literature review on cloud computing and Management 2013.
its development trends, 2012 Fourth 26. Wang Z, Liu M, Zhang S, Qiu M. Sensor
International Conference on Multimedia virtualization for underwater event
Information Networking and Security, detection. Journal of Systems Architecture
Nanjing, China, 2012; 142–146. IEEE. 2014.
12. Marozzo F, Talia D, Trunfio P. P2P- 27. Modi C, Patel D, Borisaniya B, Patel H. A
MapReduce: parallel data processing in survey of instrusion detection techniques in
dynamic cloud environments. Journal of cloud. Journal of Network and Computer
Computer and System Sciences 2012. Applications 2013.
13. Masdari M, Zebardast B, Lotfi Y. Towards 28. Liao H, Lin CR, Lin Y, Tung K. Intrusion
virtualization in cloud computing. detection system: a comprehensive review.
International Journal of Advanced Research Journal of Network and Computer
in Computer Science 2013. Applications 2013.
14. Wang Y, Sun W, Zhou S, Pei X, Li X. Key 29. Lin Q, Qi Z, Wu J, Dong Y, Guan H.
technologies of distributed storage for Optimizing virtual machines using hybrid
cloud computing. Journal of Software 2012. virtualization. Journal of Systems and
15. Zhang S, Yan H, Chen X. Research on key Software 2012.
technologies of cloud computing. In 30. Gani A, Nayeem GM, Shiraz M, Sookhak
M, Whaiduzzaman M, Khan S. A review on

108 IITM Journal of Management and IT


interworking and mobility techniques for an overview. International Journal of
seamless connectivity in mobile cloud Computer Applications 2013.
computing. Journal of Network and 42. Stakhanova N, Basu S, Wong J. On the
symbiosis of specification-based and
Computer Applications 2014.
anomaly-based detection Computer &
31. Dobre C, Xhafa F. Parallel programming Security 2010.
paradigms and frameworks in big data era. 43. Gogoi P, Bhattacharyya DK, Borah B,
International Journal of Parallel Kalita K. MLHIDS a multi-level hybrid
Programming 2014. intrusion detection method The Computer
32. Lei W, Hai W, Yu Y, Fei Z. Heterogeneous Journal 2014.
network in LTE-advanced system, 44. Nadeem A, Howarth M. Protection of
MANETs from a range of attacks using an
Proceedings of 2010 IEEE International
intrusion detection and prevention system.
Conference on Communication Systems, Telecommunication Systems 2013.
Singapore, 2010. 45. Aydın, M. A., Zaim, A. H., & Ceylan, K.
33. Tian Y, Lin C, Li K. Managing G. (2009). A hybrid intrusion detection
performance and power consumption system design for computer network
tradeoff for multiple heterogeneous servers security. Computers & Electrical
in cloud computing. Cluster Computing Engineering, 35(3), 517-526.
2014. 46. Peddabachigari, S., Abraham, A., Grosan,
34. Barbu OE, Fratu O. An enabler of C., & Thomas, J. (2007). Modeling
interoperability in heterogeneous wireless intrusion detection system using hybrid
networks, 2011 2nd International intelligent systems. Journal of network and
Conference on Wireless Communication, computer applications, 30(1), 114-132.
47. Zhang, J., & Zulkernine, M. (2006, April).
Vehicular Technology, Information Theory A hybrid network intrusion detection
and Aerospace & Electronic Systems technique using random forests. In
Technology, Chennai, 2011. Availability, Reliability and Security, 2006.
35. Anjum, F., Subhadrabandhu, D., & Sarkar, ARES 2006. The First International
S. (2003, October). Signature based Conference on (pp. 8-pp). IEEE.
intrusion detection for wireless ad-hoc 48. Hai, T. H., Khan, F., & Huh, E. N. (2007,
August). Hybrid intrusion detection system
networks: A comparative study of various
for wireless sensor networks. In
routing protocols. In Vehicular Technology International Conference on Computational
Conference, 2003. VTC 2003-Fall. 2003 Science and Its Applications (pp. 383-396).
IEEE 58th(Vol. 3, pp. 2152-2156). IEEE. Springer, Berlin, Heidelberg.
36. Ocampo F, Castillo T, Gomez M. 49. Nadeem A, Howarth M. Protection of
Automated signature creator for a signature MANETs from a range of attacks using an
based intrusion detection system with intrusion detection and prevention system.
network attack detection capabilities. Telecommunication Systems 2013.
International Journal of Cyber-Security 50. Li J, Ding Y, Xiong Z, Liu S. An improved
and Digital Forensics 2013. biometricbased user authentication scheme
37. Anbar M, Manickam S, Hosam A, Chai K, for C/S system.International Journal of
Baklizi M, Almomani A. Behaviour based Distributed Sensor Networks 2014.
worm detection and signature automation. 51. Meng W, Li W, Kwok L. EFM: enhancing
Journal of Computer Science 2011. the performance of signature-based network
38. Cherniak A, Zadorozhny VI. Signature- intrusion detection systems using enhanced
based detection of notable transitions in filter mechanism. Computers & Security
numeric data streams. IEEE Transactions 2014.
on Knowledge and Data Engineering 2013. 52. Nagarajan N. An anomaly-based network
39. Meng W, Li W, Kwok L. EFM: enhancing intrusion detection system using fuzzy
the performance of signature-based network logic. International Journal of Computer
intrusion detection systems using enhanced Science and Information Security 2010.
filter mechanism. Computers & Security 53. Nagarajan N. An anomaly-based network
2014. intrusion detection system using fuzzy
40. Meng W, Li W, Kwok L. EFM: enhancing logic. International Journal of Computer
the performance of signature-based network Science and Information Security 2010.
intrusion detection systems using enhanced 54. Sha W, Zhu Y, Huang T, Qiu M, Zhu Y,
filter mechanism. Computers & Security Zhang Q. A multi-order markov chain
2014. based scheme for anomaly detection, 2013
41. Omar S, Ngadi A, Jebur HH. Machine IEEE 37th Annual Computer Software and
learning techniques for anomaly detection:

109
Volume 11, Issue 1 ∙January-June 2020
Applications Conference Workshops 62. Whitman ME, Mattord HJ. Principles of
(COMPSACW), IEEE, Japan, 2013. Information Security, 4th edn. Information
55. Chora M, Saganowski L, Renk R, Security Professionals: Boston, MA, 2009
Houbowicz W. Statistical and signal based 63. Frederick KK. Network intrusion detection
network traffic recognition for anomaly signatures, part five, Symantec, November
detection. Expert Systems 2012. 2010
56. George A. Anomaly detection based on http://www.symantec.com/connect/articles/
machine learning: dimensionality reduction network-intrusion-detection-signatures-
using PCA and classification part-five [Accessed on December 2014].
57. using SVM. International Journal of 64. Teh PS, Teoh A BJ, Yue S. A survey of
Computer Applications 2012. keystroke dynamics biometrics. The
58. Wagh SK, Pachghare VK, Kolhe SR. Scientific World Journal 2013.
Survey on intrusion detection system using 65. Bhattacharyya D, Ranjan R, Alisherov FA,
machine learning techniques.International Choi M. Biometric authentication: a
Journal of Computer Applications 2013. review. International Journal of U- and E-
59. Kheyri D, Karami M. A comprehensive Service, Science andTechnology 2009.
survey on anomaly-based intrusion 66. Babaeizadeh M, Bakhtiari M, Maarof MA.
detection in MANET. Computer and Keystroke dynamic authentication in
Information Science 2012. mobile cloud computing.International
60. Stakhanova N, Basu S, Wong J. On the Journal of Computer Applicatios 2014.
symbiosis of specification-based and 67. Frank M, Biedert R, Ma E, Martinovic I,
anomaly-based detection. Computer & Song D. Touchalytics: on the applicability
Security 2010 of touchscreen input as a behavioral
61. Stakhanova N, Basu S, Wong J. On the biometric for continuous authentication.
symbiosis of specification-based and IEEE Transactions on Information
anomaly-based detection.Computer & Forensics and Security 2014.
Security 2010.

110 IITM Journal of Management and IT

You might also like