Implementing Hybrid Security Mechanism for Cloud Considering Intrusion , Sql Injection and Performance Degradation
Manju Sharma1, Mukesh Kumar Sharma2
1Manju Sharma*, Research Scholar, UIET Department, MDU, Rohtak, India.
2Dr. Mukesh Kumar Sharma, Department of Computer Science & Engineering, TIT & S, Bhiwani, India.
Manuscript received on March 10, 2021. | Revised Manuscript received on March 20, 2021. | Manuscript published on March 30, 2021. | PP: 142-150 | Volume-9 Issue-6, March 2021. | Retrieval Number: 100.1/ijrte.F5525039621 | DOI: 10.35940/ijrte.F5525.039621
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Considering the demand of cloud services research has considered the issues or problems related to cloud computing. Various approaches adopted by existing research have limited scope and there is need to increase the security of cloud computing environment. The issues of security threat in cloud environment are explained in this paper. There have been several security threats to cloud environment such as Intrusion, brute force, Sql injection, Trozen horse that could affect the security of cloud services. There remains issue of Un-authentic access. Moreover the identity management is becoming a great challenge. Previous researches have proposed cryptographic approach while some provided solution to hacking attempts along with unauthentic external access but these security mechanisms are not sufficient to protect the cloud. Research paper is introducing intelligent system that is capable to trace the intrusion using LSTM based training model. The model is trained in order to categorize intrusion accordingly. The focus of research is to increase the security from intrusion by providing intelligent LSTM approach. This mechanism would classify the transmission in different categories such as Dos-synflooding, MITM ARP spoofing, Mirai- Ackflooding, Mirai-Http flooding, Mirai-Hostbrute forceg, Mirai-UDP Flooding, scan hostport and Normal. Moreover research paper has focused on prevention of Sql injection attacks. In order to increase the security between sender and receiver research has also allowed two way port based hand shaking in order to transmit data more securely. The transmission would be initiated using default port but the actual transmission would be made using random port that would be set for specific time slot.
Keywords: Cloud computing, IDS, Port, Sql Injection.