A Survey of Intrusion Detection Systems for Cloud Computing Environment

被引:0
|
作者
Chiba, Zouhair [1 ]
Abghour, Noureddine [1 ]
Moussaid, Khalid [1 ]
El Omri, Amina [1 ]
Rida, Mohamed [1 ]
机构
[1] Hassan II Univ Casablanca, Fac Sci, LIMSAD Labs, Casablanca 20100, Morocco
关键词
component; Cloud computing; Cloud Security; Intrusion Detection System; Signtaure; Anomaly; Hybrid;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is a newly emerged technology, and the rapidly growing field of IT. It is used extensively to deliver Computing, data Storage services and other resources remotely over internet on a pay per usage model. Nowadays, it is the preferred choice of every IT organization because it extends its ability to meet the computing demands of its everyday operations, while providing scalability, mobility and flexibility with a low cost. However, the security and privacy is a major hurdle in its success and its wide adoption by organizations, and the reason that Chief Information Officers (CIOs) hesitate to move the data and applications from premises of organizations to the cloud. In fact, due to the distributed and open nature of the cloud, resources, applications, and data are vulnerable to intruders. Intrusion Detection System (IDS) has become the most commonly used component of computer system security and compliance practices that defends network accessible Cloud resources and services from various kinds of threats and attacks. This paper presents an overview of different intrusions in cloud, various detection techniques used by IDS and the types of Cloud Computing based IDS. Then, we analyze some pertinent existing cloud based intrusion detection systems with respect to their various types, positioning, detection time and data source. The analysis also gives strengths of each system, and limitations, in order to evaluate whether they carry out the security requirements of cloud computing environment or not. We highlight the deployment of IDS that uses multiple detection approaches to deal with security challenges in cloud.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Intrusion Detection Techniques Analysis in Cloud Computing
    Qi, Wuqi
    Wu, Wei
    Wang, Hao
    Ou, Lu
    Hu, Ning
    Tian, Zhihong
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 360 - 363
  • [32] An Adaptive Intrusion Detection Scheme for Cloud Computing
    Ibrahim, Nurudeen Mahmud
    Zainal, Anazida
    INTERNATIONAL JOURNAL OF SWARM INTELLIGENCE RESEARCH, 2019, 10 (04) : 53 - 70
  • [33] A Distributed Intrusion Detection Scheme for Cloud Computing
    Ibrahim, Nurudeen Mahmud
    Zainal, Anazida
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2020, 11 (01) : 68 - 82
  • [34] Smart Intrusion Detection Model for the Cloud Computing
    Derfouf, Mostapha
    Eleuldj, Mohsine
    Enniari, Saad
    Diouri, Ouafaa
    EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 411 - 421
  • [35] Intrusion Detection Systems (IDS) & Future Challenges in Cloud Based Environment
    Bharati, Manisha
    Tamane, Sharvaree
    2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 240 - 250
  • [36] Virtual Machine-based Intrusion Detection System Framework in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    Wang, Chundong
    JOURNAL OF COMPUTERS, 2012, 7 (10) : 2397 - 2403
  • [37] Design of Hypervisor-based Integrated Intrusion Detection System in Cloud Computing Environment
    Wang, Chih-Hung
    Chen, Xuan-Liang
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 972 - 981
  • [38] Horse Herd optimization with deep learning based intrusion detection in cloud computing environment
    Samineni Nagamani
    S. Arivalagan
    M. Senthil
    P. Sudhakar
    International Journal of Information Technology, 2025, 17 (1) : 387 - 393
  • [39] Design of Intrusion Detection System using Ensemble Learning Technique in Cloud Computing Environment
    Bingu, Rajesh
    Jothilakshmi, S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (05) : 751 - 764
  • [40] A Meta-analytic Review of Intelligent Intrusion Detection Techniques in Cloud Computing Environment
    Raj, Meghana G.
    Pani, Santosh Kumar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 206 - 217