A Survey of Intrusion Detection Systems for Cloud Computing Environment

被引:0
|
作者
Chiba, Zouhair [1 ]
Abghour, Noureddine [1 ]
Moussaid, Khalid [1 ]
El Omri, Amina [1 ]
Rida, Mohamed [1 ]
机构
[1] Hassan II Univ Casablanca, Fac Sci, LIMSAD Labs, Casablanca 20100, Morocco
关键词
component; Cloud computing; Cloud Security; Intrusion Detection System; Signtaure; Anomaly; Hybrid;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is a newly emerged technology, and the rapidly growing field of IT. It is used extensively to deliver Computing, data Storage services and other resources remotely over internet on a pay per usage model. Nowadays, it is the preferred choice of every IT organization because it extends its ability to meet the computing demands of its everyday operations, while providing scalability, mobility and flexibility with a low cost. However, the security and privacy is a major hurdle in its success and its wide adoption by organizations, and the reason that Chief Information Officers (CIOs) hesitate to move the data and applications from premises of organizations to the cloud. In fact, due to the distributed and open nature of the cloud, resources, applications, and data are vulnerable to intruders. Intrusion Detection System (IDS) has become the most commonly used component of computer system security and compliance practices that defends network accessible Cloud resources and services from various kinds of threats and attacks. This paper presents an overview of different intrusions in cloud, various detection techniques used by IDS and the types of Cloud Computing based IDS. Then, we analyze some pertinent existing cloud based intrusion detection systems with respect to their various types, positioning, detection time and data source. The analysis also gives strengths of each system, and limitations, in order to evaluate whether they carry out the security requirements of cloud computing environment or not. We highlight the deployment of IDS that uses multiple detection approaches to deal with security challenges in cloud.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] A Survey on Intrusion Detection Systems for Fog and Cloud Computing
    Chang, Victor
    Golightly, Lewis
    Modesti, Paolo
    Xu, Qianwen Ariel
    Doan, Le Minh Thao
    Hall, Karl
    Boddu, Sreeja
    FUTURE INTERNET, 2022, 14 (03):
  • [2] Critical Review of Intrusion Detection Systems In Cloud Computing Environment
    Aborujilah, Abdulaziz
    Musa, Shahrulniza
    2016 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICICTM), 2016, : 251 - 255
  • [3] Intrusion detection techniques in cloud environment: A survey
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 18 - 47
  • [4] Collaborative Intrusion Detection as a Service in Cloud Computing Environment
    Liang, Hong
    Ge, Yufei
    Wang, Wenjiao
    Chen, Lin
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 476 - 480
  • [5] The Research of Intrusion Detection System in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 45 - 49
  • [6] Performance Analysis of Intrusion Detection Systems in the Cloud Computing
    Abdelaziz, Ettaoufik
    Mohamed, Ouzzif
    PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 136 - 143
  • [7] Efficacious Novel Intrusion Detection System for Cloud Computing Environment
    Rana, Pooja
    Batra, Isha
    Malik, Arun
    Ra, In-Ho
    Lee, Oh-Sung
    Hosen, A. S. M. Sanwar
    IEEE ACCESS, 2024, 12 : 99223 - 99239
  • [8] Intrusion Detection in Cloud Computing
    Ficco, Massimo
    Tasquier, Luca
    Aversa, Rocco
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 276 - 283
  • [9] Hierarchical Model for Intrusion Detection Systems in the Cloud Environment
    Abdulazeez, Muhammed
    Kowalski, Dariusz
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 319 - 327
  • [10] Intrusion Detection Systems for High Performance Computing Environment
    Mishra, Brojo Kishore
    Sahu, Minakshi
    Das, Satya Naryan
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,