A Review on Intrusion Detection Techniques for Cloud Computing and Security Challenges

被引:0
|
作者
Kene, Snehal G. [1 ]
Theng, Deepti P. [1 ]
机构
[1] GH Raisoni Coll Engn, Dept Comp Sci & Engn, Nagpur, Maharashtra, India
关键词
Cloud Computing; Cloud Security; Intrusion Detection System; Signature; Anomaly; SYSTEM;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, Cloud Computing is the first choice of every IT organization because of its scalable and flexible nature. However, the security and privacy is a major concern in its success because of its open and distributed architecture that is open for intruders. Intrusion Detection System ( IDS) is the most commonly used mechanism to detect various attacks on cloud. This paper shares an over view of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems with respect to their various types, positioning, detection time, detection techniques, data source and attacks. The analysis also provides limitations of each technique to determine whether they fulfill the security needs of cloud computing environment or not. We highlight the deployment of IDS that uses multiple detection methods to manage with security challenges in cloud.
引用
收藏
页码:227 / 232
页数:6
相关论文
共 50 条
  • [31] An Analysis of Security Challenges in Cloud Computing
    Parekh, Disha H.
    Sridaran, R.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (01) : 38 - 46
  • [32] Security Challenges in Vehicular Cloud Computing
    Yan, Gongjun
    Wen, Ding
    Olariu, Stephan
    Weigle, Michele C.
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2013, 14 (01) : 284 - 294
  • [33] The Security Challenges in Healthcare Cloud Computing
    Alsuwaidani, Talal
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (03): : 731 - 737
  • [34] Recent security challenges in cloud computing
    Subramanian, Nalini
    Jeyaraj, Andrews
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 71 : 28 - 42
  • [35] Security challenges in the distributed cloud computing
    Nwobodo, Ikechukwu
    Jahankhani, Hossein
    Edoh, Aloysius
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (01) : 38 - 51
  • [36] Security and Privacy Challenges in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    [J]. PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
  • [37] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [38] Security in cloud computing: Opportunities and challenges
    Ali, Mazhar
    Khan, Samee U.
    Vasilakos, Athanasios V.
    [J]. INFORMATION SCIENCES, 2015, 305 : 357 - 383
  • [39] Intrusion detection systems in the cloud computing: A comprehensive and deep literature review
    Liu, Zhiqiang
    Xu, Bo
    Cheng, Bo
    Hu, Xiaomei
    Darbandi, Mehdi
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (04):
  • [40] Security Techniques for Cloud Computing Environment
    Garg, Prachi
    Goel, Sandeep
    Sharma, Avinash
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 771 - 776