An Intrusion Detection System for Malicious Attacks in Cloud Environment Using Decision Tree Techniques

Authors

  • Gopala B Dep. of Computer Science and Applications Bangalore University, Bangalore, India.
  • Hanumanthappa M Dep. of Computer Science and Applications Bangalore University, Bangalore, India.

DOI:

https://doi.org/10.26438/ijcse/v6i8.878881

Keywords:

Cloud computing, IDS, Threats, Decision Tree, cloud service providers

Abstract

Secured and reliable services in cloud computing environment is an important issue. A sensitive data in a cloud computing environment is major issues with regard to security in a cloud based system. Many cloud service providers obtain server from other service providers due to it is cost affective and flexible for operation which makes way for data stolen from the external server. To counter a variety of attacks, especially large-scale coordinated attacks, this paper provides a framework for identifying intrusions in cloud environment using Decision Tree Techniques. The proposed system could reduce the impact of these kinds of attacks through providing timely notifications about new intrusions to Cloud users’ systems

References

[1] Xinfeng Ye Access Control for Cloud Applications IEEE 2015.

[2] Sonia Bassi et al. Cloud Computing Data Security-Background & Benefits IJCSC 2015.

[3] Navadeep Agganwal et al. Cloud Computing: Data Storage Security Analysis and its Challenges International Journal of Computer Applications Volume 70– No.24, May 2013.

[4] Keiko Hashizume et al. An Analysis of security issues for cloud computing, Journal of Internet services and applications, Springer 2013.

[5] Manoj K et al. Unsupervised Outlier Detection Technique for Intrusion Detection in Cloud Computing, ICCT IEEE 2014.

[6] Roshanak Roshandel et al. User-Centric Monitoring of Sensitive Information Access in Android Applications, 2nd ACM International Conference on Mobile Software Engineering and Systems IEEE 2015.

[7] Richa et. al, To Improve Security in Cloud Computing with Intrusion detection system using Neural Network. IJSCE 2013.

[8] J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann, 1993.

[9] J. R. Quinlan. Induction of Decision Trees. Machine Learning, 1:81-106, 1986.

[10] Manish, Dr. Hanumanthappa M, Intrusion Detection System Using Decision Tree Algorithm, IEEE 2012.

Downloads

Published

2025-11-15
CITATION
DOI: 10.26438/ijcse/v6i8.878881
Published: 2025-11-15

How to Cite

[1]
B. Gopala and M. Hanumanthappa, “An Intrusion Detection System for Malicious Attacks in Cloud Environment Using Decision Tree Techniques”, Int. J. Comp. Sci. Eng., vol. 6, no. 8, pp. 878–881, Nov. 2025.

Issue

Section

Research Article