Intrusion Detection Techniques Analysis in Cloud Computing

被引:0
|
作者
Qi, Wuqi [1 ]
Wu, Wei [1 ]
Wang, Hao [1 ]
Ou, Lu [1 ]
Hu, Ning [1 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Cloud Security; Intrusion Detection; Artificial Intelligence; Dataset;
D O I
10.1109/CloudNet59005.2023.10490069
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth and widespread usage of cloud computing have brought security concerns to the forefront. To tackle these concerns, extensive research and development efforts have been dedicated to intrusion detection techniques. This paper provides an investigation and analysis of the current state of intrusion detection techniques in cloud computing. It encompasses the classification of existing techniques and an examination of the security requirements specific to cloud computing. We systematically summarize the novel approaches to intrusion detection techniques in cloud computing and explore how artificial intelligence techniques can enhance intrusion detection. In terms of evaluating these techniques, we conduct a comparative analysis of the merits and limitations of available datasets. Lastly, we elucidate the challenges inherent to intrusion detection in the cloud and outline future research directions.
引用
下载
收藏
页码:360 / 363
页数:4
相关论文
共 50 条
  • [1] A Comparative Analysis of Different Intrusion Detection Techniques in Cloud Computing
    Bakshi, Aditya
    Sunanda
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 358 - 378
  • [2] A Collaborative Study of Intrusion Detection and Prevention Techniques in Cloud Computing
    Alam, Shadab
    Shuaib, Mohammed
    Samad, Abdus
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 231 - 240
  • [3] A Review on Intrusion Detection Techniques for Cloud Computing and Security Challenges
    Kene, Snehal G.
    Theng, Deepti P.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 227 - 232
  • [4] Intrusion Detection in Cloud Computing
    Ficco, Massimo
    Tasquier, Luca
    Aversa, Rocco
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 276 - 283
  • [5] Performance Analysis of Intrusion Detection Systems in the Cloud Computing
    Abdelaziz, Ettaoufik
    Mohamed, Ouzzif
    PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 136 - 143
  • [6] Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions
    Riaz, Amna
    Ahmad, Hafiz Farooq
    Kiani, Adnan Khaild
    Qadir, Junaid
    Rasool, Raihan Ur
    Younis, Usman
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 611 - 634
  • [7] Intrusion Detection for Grid and Cloud Computing
    Vieira, Kleber
    Schulter, Alexandre
    Westphall, Carlos Becker
    Westphall, Carla Merkle
    IT PROFESSIONAL, 2010, 12 (04) : 38 - 43
  • [8] Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview
    Rana, Pooja
    Batra, Isha
    Malik, Arun
    Imoize, Agbotiname Lucky
    Kim, Yongsung
    Pani, Subhendu Kumar
    Goyal, Nitin
    Kumar, Arun
    Rho, Seungmin
    COMPLEXITY, 2022, 2022
  • [9] Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview
    Rana, Pooja
    Batra, Isha
    Malik, Arun
    Imoize, Agbotiname Lucky
    Kim, Yongsung
    Pani, Subhendu Kumar
    Goyal, Nitin
    Kumar, Arun
    Rho, Seungmin
    COMPLEXITY, 2022, 2022
  • [10] Intrusion detection techniques for mobile cloud computing in heterogeneous 5G
    Gai, Keke
    Qiu, Meikang
    Tao, Lixin
    Zhu, Yongxin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3049 - 3058