Intrusion detection techniques in cloud environment: A survey

被引:124
|
作者
Mishra, Preeti [1 ]
Pilli, Emmanuel S. [1 ]
Varadharajan, Vijay [2 ]
Tupakula, Udaya [2 ]
机构
[1] Malaviya Natl Inst Technol Jaipur, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
[2] Macquarie Univ, Fac Sci & Engn, Dept Comp, Sydney, NSW, Australia
关键词
Intrusion detection; Cloud security; Virtual machine introspection; Hypervisor introspection; Cloud attacks; DETECTION SYSTEM; ANOMALY DETECTION; ARCHITECTURAL SUPPORT; SECURITY ISSUES; ENCRYPTION; HYPERVISOR; MODEL; NIDS;
D O I
10.1016/j.jnca.2016.10.015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have provided a survey on several intrusion detection techniques for detecting intrusions in the cloud computing environment. Most of them provide a discussion over traditional misuse and anomaly detection techniques. Virtual Machine Introspection (VMI) techniques are very helpful in detecting various stealth attacks targeting user-level and kernel-level processes running in virtual machines (VMs) by placing the analyzing component outside the VM generally at hypervisor. Hypervisor Introspection (HVI) techniques ensure the hypervisor security and prevent a compromised hypervisor to launch further attacks on VMs running over it. Introspection techniques introspect the hypervisor by using hardware-assisted virtualization-enabled technologies. The main focus of our paper is to provide an exhaustive literature survey of various Intrusion Detection techniques proposed for cloud environment with an analysis of their attack detection capability. We propose a threat model and attack taxonomy in cloud environment to elucidate the vulnerabilities in cloud. Our taxonomy of IDS techniques represent the state of the art classification and provides a detailed study of techniques with their distinctive features. We have provided a deep insight into Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) based techniques in the survey. Specific research challenges are identified to give future direction to researchers. We hope that our work will enable researchers to launch and dive deep into intrusion detection approaches in a cloud environment.
引用
收藏
页码:18 / 47
页数:30
相关论文
共 50 条
  • [1] A survey of intrusion detection techniques in Cloud
    Modi, Chirag
    Patel, Dhiren
    Borisaniya, Bhavesh
    Patel, Hiren
    Patel, Avi
    Rajarajan, Muttukrishnan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 42 - 57
  • [2] A Survey of Intrusion Detection Systems for Cloud Computing Environment
    Chiba, Zouhair
    Abghour, Noureddine
    Moussaid, Khalid
    El Omri, Amina
    Rida, Mohamed
    [J]. 2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [3] A Survey on Intrusion Detection Techniques in MANET
    20163702795437
    [J]. (1) Department of Computer Science and Engineering, University Institute of Technology, Bhopal, India, 1600, (Institute of Electrical and Electronics Engineers Inc., United States):
  • [4] A Survey on Intrusion Detection Techniques in MANET
    Soni, Mohit
    Ahirwar, Manish
    Agrawal, Shikha
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1027 - 1032
  • [5] INTRUSION DETECTION TECHNIQUES PERFORMANCE IN CLOUD ENVIRONMENTS
    Sabahi, Farzad
    [J]. PROCEEDINGS OF THE 2011 3RD INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2011), 2011, : 431 - 435
  • [6] Intrusion Detection Techniques Analysis in Cloud Computing
    Qi, Wuqi
    Wu, Wei
    Wang, Hao
    Ou, Lu
    Hu, Ning
    Tian, Zhihong
    [J]. 2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 360 - 363
  • [7] A Meta-analytic Review of Intelligent Intrusion Detection Techniques in Cloud Computing Environment
    Raj, Meghana G.
    Pani, Santosh Kumar
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 206 - 217
  • [8] Intrusion detection in Cloud Internet of Things Environment
    Rebbah, Mohammed
    Rebbah, Dhiaa El Hak
    Smail, Omar
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MATHEMATICS AND INFORMATION TECHNOLOGY (ICMIT), 2017, : 65 - 70
  • [9] Efficient Approaches for Intrusion Detection in Cloud Environment
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1211 - 1216
  • [10] A Survey: Intrusion Detection Techniques for Internet of Things
    Choudhary, Sarika
    Kesswani, Nishtha
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (01) : 86 - 105