A Survey on Various Intrusion Detection System Tools and Methods in Cloud Computing

被引:0
|
作者
Akshaya, Swathy M. [1 ]
Padmavathi, G. [1 ]
机构
[1] Deemed Univ, Avinashilingam Inst Home Sci & Higher Educ Women, Dept Comp Sci, Coimbatore, Tamil Nadu, India
关键词
cloud computing; cloud attacks; intrusion detection; computational intelligence;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud Computing (CC) depends on sharing of resources to achieve coherence and economies of scale similar to a public utility. An Intrusion Detection System (IDS) is a network based security technology built for detecting vulnerability exploits against a target application or computer. Computational Intelligence (CI) refers to a set of nature-inspired computational methodologies and approaches to address complex real world problems; solutions to these problems may not be possible through mathematical reasoning. The objective of the paper is to account for cloud intrusions, various classifications of IDS along with CI in cloud. The paper discusses the inter-link between the intrusion detection methods and computational intelligence in a cloud environment. The survey reveals a detailed classification of IDS through various parametric techniques and the purpose of the classification is to provide IDS in a nutshell by using CI methodology.
引用
收藏
页码:439 / 445
页数:7
相关论文
共 50 条
  • [1] A Survey of Intrusion Detection Systems for Cloud Computing Environment
    Chiba, Zouhair
    Abghour, Noureddine
    Moussaid, Khalid
    El Omri, Amina
    Rida, Mohamed
    [J]. 2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [2] A Survey on Intrusion Detection Systems for Fog and Cloud Computing
    Chang, Victor
    Golightly, Lewis
    Modesti, Paolo
    Xu, Qianwen Ariel
    Doan, Le Minh Thao
    Hall, Karl
    Boddu, Sreeja
    [J]. FUTURE INTERNET, 2022, 14 (03):
  • [3] A Collaborative Intrusion Detection and Prevention System in Cloud Computing
    Hassani, Mohamed
    Lebbat, Adil
    Talial, Saida
    Imedromi, Hicham
    [J]. AFRICON, 2013, 2013,
  • [4] Poster: Developing an Intrusion Detection System for Cloud Computing
    Dang Duy Thang
    Le Hoai Nam
    Nguyen Tan Khoi
    [J]. MOBISYS'16: COMPANION COMPANION PUBLICATION OF THE 14TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2016, : 20 - 20
  • [5] Proxy Network Intrusion Detection System for Cloud Computing
    Oktay, Ueman
    Sahingoz, Ozgur Koray
    [J]. 2013 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (TAEECE), 2013, : 98 - 104
  • [6] The Research of Intrusion Detection System in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    [J]. ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 45 - 49
  • [7] A Hybrid Intrusion Detection System for Cloud Computing Environments
    Jelidi, Mohamed
    Ghourabi, Abdallah
    Gasmi, Karim
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 390 - 395
  • [8] Intrusion Detection System in Cloud Computing: Challenges and Opportunities
    Mehmood, Yasir
    Shibli, Muhammad Awais
    Habiba, Umme
    Masood, Rahat
    [J]. 2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 59 - 66
  • [9] An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC)
    Alqahtani, Saeed M.
    Al Balushi, Maqbool
    John, Robert
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, : 135 - 141
  • [10] Intrusion Detection in Cloud Computing
    Ficco, Massimo
    Tasquier, Luca
    Aversa, Rocco
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 276 - 283