A Review on Intrusion Detection Techniques for Cloud Computing and Security Challenges

被引:0
|
作者
Kene, Snehal G. [1 ]
Theng, Deepti P. [1 ]
机构
[1] GH Raisoni Coll Engn, Dept Comp Sci & Engn, Nagpur, Maharashtra, India
关键词
Cloud Computing; Cloud Security; Intrusion Detection System; Signature; Anomaly; SYSTEM;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, Cloud Computing is the first choice of every IT organization because of its scalable and flexible nature. However, the security and privacy is a major concern in its success because of its open and distributed architecture that is open for intruders. Intrusion Detection System ( IDS) is the most commonly used mechanism to detect various attacks on cloud. This paper shares an over view of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems with respect to their various types, positioning, detection time, detection techniques, data source and attacks. The analysis also provides limitations of each technique to determine whether they fulfill the security needs of cloud computing environment or not. We highlight the deployment of IDS that uses multiple detection methods to manage with security challenges in cloud.
引用
收藏
页码:227 / 232
页数:6
相关论文
共 50 条
  • [1] Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review
    Modi, Chirag N.
    Acha, Kamatchi
    [J]. JOURNAL OF SUPERCOMPUTING, 2017, 73 (03): : 1192 - 1234
  • [2] Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review
    Chirag N. Modi
    Kamatchi Acha
    [J]. The Journal of Supercomputing, 2017, 73 : 1192 - 1234
  • [3] Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions
    Riaz, Amna
    Ahmad, Hafiz Farooq
    Kiani, Adnan Khaild
    Qadir, Junaid
    Rasool, Raihan Ur
    Younis, Usman
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 611 - 634
  • [4] Intrusion Detection Techniques Analysis in Cloud Computing
    Qi, Wuqi
    Wu, Wei
    Wang, Hao
    Ou, Lu
    Hu, Ning
    Tian, Zhihong
    [J]. 2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 360 - 363
  • [5] Intrusion Detection System in Cloud Computing: Challenges and Opportunities
    Mehmood, Yasir
    Shibli, Muhammad Awais
    Habiba, Umme
    Masood, Rahat
    [J]. 2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 59 - 66
  • [6] Cloud computing security issues & challenges: A Review
    Mondal, Avijit
    Paul, Subrata
    Goswami, Radha Tamal
    Nath, Sayan
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 159 - +
  • [7] A Review on Security Challenges and Approaches in the Cloud Computing
    Alsaadi, Elham Mohammed Thabit A.
    Fayadh, Sabah Mohammed
    Alabaichi, Ashwak
    [J]. 8TH INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY (ICAST 2020), 2020, 2290
  • [8] A Meta-analytic Review of Intelligent Intrusion Detection Techniques in Cloud Computing Environment
    Raj, Meghana G.
    Pani, Santosh Kumar
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 206 - 217
  • [9] A Collaborative Study of Intrusion Detection and Prevention Techniques in Cloud Computing
    Alam, Shadab
    Shuaib, Mohammed
    Samad, Abdus
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 231 - 240
  • [10] A Comparative Analysis of Different Intrusion Detection Techniques in Cloud Computing
    Bakshi, Aditya
    Sunanda
    [J]. ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 358 - 378