Intrusion Detection Techniques Analysis in Cloud Computing

被引:0
|
作者
Qi, Wuqi [1 ]
Wu, Wei [1 ]
Wang, Hao [1 ]
Ou, Lu [1 ]
Hu, Ning [1 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Cloud Security; Intrusion Detection; Artificial Intelligence; Dataset;
D O I
10.1109/CloudNet59005.2023.10490069
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth and widespread usage of cloud computing have brought security concerns to the forefront. To tackle these concerns, extensive research and development efforts have been dedicated to intrusion detection techniques. This paper provides an investigation and analysis of the current state of intrusion detection techniques in cloud computing. It encompasses the classification of existing techniques and an examination of the security requirements specific to cloud computing. We systematically summarize the novel approaches to intrusion detection techniques in cloud computing and explore how artificial intelligence techniques can enhance intrusion detection. In terms of evaluating these techniques, we conduct a comparative analysis of the merits and limitations of available datasets. Lastly, we elucidate the challenges inherent to intrusion detection in the cloud and outline future research directions.
引用
收藏
页码:360 / 363
页数:4
相关论文
共 50 条
  • [41] Cooperative Machine Learning Techniques for Cloud Intrusion Detection
    Chkirbene, Zina
    Hamila, Ridha
    Erbad, Aiman
    Kiranyaz, Serkan
    Al-Emadi, Nasser
    Hamdi, Mounir
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 837 - 842
  • [42] Detection of Intrusion Using Evolutionary Soft Computing Techniques
    Arya, Akansha
    Yadav, Aruna
    Kumar, Sanjeev
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 691 - 696
  • [43] Incorporating soft computing techniques for intrusion detection systems
    Yu, Yingbing
    Patel, Sandip C.
    2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 1 - 5
  • [44] Efficacious Novel Intrusion Detection System for Cloud Computing Environment
    Rana, Pooja
    Batra, Isha
    Malik, Arun
    Ra, In-Ho
    Lee, Oh-Sung
    Hosen, A. S. M. Sanwar
    IEEE ACCESS, 2024, 12 : 99223 - 99239
  • [45] A study on intrusion detection algorithms for user data cloud computing
    Li Y.
    International Journal of Simulation: Systems, Science and Technology, 2016, 17 (36): : 14.1 - 14.6
  • [46] An Intrusion Detection Framework for Supporting SLA Assessment in Cloud Computing
    Ficco, Massimo
    Rak, Massimiliano
    Di Martino, Beniamino
    2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 244 - 249
  • [47] Critical Review of Intrusion Detection Systems In Cloud Computing Environment
    Aborujilah, Abdulaziz
    Musa, Shahrulniza
    2016 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICICTM), 2016, : 251 - 255
  • [48] Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing
    Ravji, Sajaan
    Ali, Maaruf
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 95 - 100
  • [49] An Enhanced Approach for Intrusion Detection in Virtual Network of Cloud Computing
    Kadam, Deeksha
    Patil, Rajendra
    Modi, Chirag
    2018 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2018, : 80 - 87
  • [50] Dual stage ensemble technique for intrusion detection in cloud computing
    Neelakantan, P.
    Yadav, N. Sudhakar
    WEB INTELLIGENCE, 2023, 21 (01) : 19 - 35