A Survey of Intrusion Detection Systems for Cloud Computing Environment

被引:0
|
作者
Chiba, Zouhair [1 ]
Abghour, Noureddine [1 ]
Moussaid, Khalid [1 ]
El Omri, Amina [1 ]
Rida, Mohamed [1 ]
机构
[1] Hassan II Univ Casablanca, Fac Sci, LIMSAD Labs, Casablanca 20100, Morocco
关键词
component; Cloud computing; Cloud Security; Intrusion Detection System; Signtaure; Anomaly; Hybrid;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is a newly emerged technology, and the rapidly growing field of IT. It is used extensively to deliver Computing, data Storage services and other resources remotely over internet on a pay per usage model. Nowadays, it is the preferred choice of every IT organization because it extends its ability to meet the computing demands of its everyday operations, while providing scalability, mobility and flexibility with a low cost. However, the security and privacy is a major hurdle in its success and its wide adoption by organizations, and the reason that Chief Information Officers (CIOs) hesitate to move the data and applications from premises of organizations to the cloud. In fact, due to the distributed and open nature of the cloud, resources, applications, and data are vulnerable to intruders. Intrusion Detection System (IDS) has become the most commonly used component of computer system security and compliance practices that defends network accessible Cloud resources and services from various kinds of threats and attacks. This paper presents an overview of different intrusions in cloud, various detection techniques used by IDS and the types of Cloud Computing based IDS. Then, we analyze some pertinent existing cloud based intrusion detection systems with respect to their various types, positioning, detection time and data source. The analysis also gives strengths of each system, and limitations, in order to evaluate whether they carry out the security requirements of cloud computing environment or not. We highlight the deployment of IDS that uses multiple detection approaches to deal with security challenges in cloud.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Network Intrusion Detection Method Combining CNN and BiLSTM in Cloud Computing Environment
    Gao, Jing
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [22] Distributed Intrusion Detection System using Mobile Agents in Cloud Computing Environment
    Mehmood, Yasir
    Kanwal, Ayesha
    Shibli, Muhammad Awais
    Masood, Rahat
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 1 - 8
  • [23] A Deep Learning Approach for Intrusion Detection Systems in Cloud Computing Environments
    Aljuaid, Wa'ad H.
    Alshamrani, Sultan S.
    APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [24] Intrusion detection systems in the cloud computing: A comprehensive and deep literature review
    Liu, Zhiqiang
    Xu, Bo
    Cheng, Bo
    Hu, Xiaomei
    Darbandi, Mehdi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (04):
  • [25] Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A Survey
    Alarqan, Mohammad Abdelkareem
    Zaaba, Zarul Fitri
    Almomani, Ammar
    ADVANCES IN CYBER SECURITY (ACES 2019), 2020, 1132 : 138 - 152
  • [26] A survey of intrusion detection techniques in Cloud
    Modi, Chirag
    Patel, Dhiren
    Borisaniya, Bhavesh
    Patel, Hiren
    Patel, Avi
    Rajarajan, Muttukrishnan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 42 - 57
  • [27] Detection and Prevention of Criminal Attacks in Cloud Computing Using a Hybrid Intrusion Detection Systems
    Nsabimana, Thierry
    Bimenyimana, Christian Ildegard
    Odumuyiwa, Victor
    Hounsou, Joel Toyigbe
    INTELLIGENT HUMAN SYSTEMS INTEGRATION 2020, 2020, 1131 : 667 - 676
  • [28] An advanced intrusion detection framework for cloud computing
    Ficco, Massimo
    Venticinque, Salvatore
    Di Martino, Beniamino
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2013, 28 (06): : 401 - 411
  • [29] A CP Intrusion Detection Strategy on Cloud Computing
    Guan, Yizhang
    Bao, Jianghong
    2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 84 - 87
  • [30] Implementations of Intrusion Detection Architectures in Cloud Computing
    Derfouf, Mostapha
    Eleuldj, Mohsine
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 100 - 124