Intrusion Detection Techniques Analysis in Cloud Computing

被引:0
|
作者
Qi, Wuqi [1 ]
Wu, Wei [1 ]
Wang, Hao [1 ]
Ou, Lu [1 ]
Hu, Ning [1 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Cloud Security; Intrusion Detection; Artificial Intelligence; Dataset;
D O I
10.1109/CloudNet59005.2023.10490069
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth and widespread usage of cloud computing have brought security concerns to the forefront. To tackle these concerns, extensive research and development efforts have been dedicated to intrusion detection techniques. This paper provides an investigation and analysis of the current state of intrusion detection techniques in cloud computing. It encompasses the classification of existing techniques and an examination of the security requirements specific to cloud computing. We systematically summarize the novel approaches to intrusion detection techniques in cloud computing and explore how artificial intelligence techniques can enhance intrusion detection. In terms of evaluating these techniques, we conduct a comparative analysis of the merits and limitations of available datasets. Lastly, we elucidate the challenges inherent to intrusion detection in the cloud and outline future research directions.
引用
收藏
页码:360 / 363
页数:4
相关论文
共 50 条
  • [31] Proxy Network Intrusion Detection System for Cloud Computing
    Oktay, Ueman
    Sahingoz, Ozgur Koray
    2013 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (TAEECE), 2013, : 98 - 104
  • [32] An Improved Distributed Intrusion Detection Architecture for Cloud Computing
    Ghorbani, Hamid Reza
    Hashemi, Mahmoud Reza
    COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS, CNDS 2013, 2014, 428 : 105 - 116
  • [33] HIDCC: A hybrid intrusion detection approach in cloud computing
    Hatef, Mohammad Amin
    Shaker, Vahid
    Jabbarpour, Mohammad Reza
    Jung, Jason
    Zarrabi, Houman
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (03):
  • [34] Towards Targeted Intrusion Detection Deployments in Cloud Computing
    Ahmed, Norman
    Bhargava, Bharat
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2015, 6 (02): : 129 - 139
  • [35] A Survey of Intrusion Detection Systems for Cloud Computing Environment
    Chiba, Zouhair
    Abghour, Noureddine
    Moussaid, Khalid
    El Omri, Amina
    Rida, Mohamed
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [36] Intrusion Detection System in Cloud Computing: Challenges and Opportunities
    Mehmood, Yasir
    Shibli, Muhammad Awais
    Habiba, Umme
    Masood, Rahat
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 59 - 66
  • [37] An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC)
    Alqahtani, Saeed M.
    Al Balushi, Maqbool
    John, Robert
    2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, : 135 - 141
  • [38] A Hybrid Intrusion Detection System for Cloud Computing Environments
    Jelidi, Mohamed
    Ghourabi, Abdallah
    Gasmi, Karim
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 390 - 395
  • [39] The Research of Intrusion Detection System in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 45 - 49
  • [40] A Survey on Intrusion Detection Systems for Fog and Cloud Computing
    Chang, Victor
    Golightly, Lewis
    Modesti, Paolo
    Xu, Qianwen Ariel
    Doan, Le Minh Thao
    Hall, Karl
    Boddu, Sreeja
    FUTURE INTERNET, 2022, 14 (03):