A Survey of Intrusion Detection Systems for Cloud Computing Environment

被引:0
|
作者
Chiba, Zouhair [1 ]
Abghour, Noureddine [1 ]
Moussaid, Khalid [1 ]
El Omri, Amina [1 ]
Rida, Mohamed [1 ]
机构
[1] Hassan II Univ Casablanca, Fac Sci, LIMSAD Labs, Casablanca 20100, Morocco
关键词
component; Cloud computing; Cloud Security; Intrusion Detection System; Signtaure; Anomaly; Hybrid;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is a newly emerged technology, and the rapidly growing field of IT. It is used extensively to deliver Computing, data Storage services and other resources remotely over internet on a pay per usage model. Nowadays, it is the preferred choice of every IT organization because it extends its ability to meet the computing demands of its everyday operations, while providing scalability, mobility and flexibility with a low cost. However, the security and privacy is a major hurdle in its success and its wide adoption by organizations, and the reason that Chief Information Officers (CIOs) hesitate to move the data and applications from premises of organizations to the cloud. In fact, due to the distributed and open nature of the cloud, resources, applications, and data are vulnerable to intruders. Intrusion Detection System (IDS) has become the most commonly used component of computer system security and compliance practices that defends network accessible Cloud resources and services from various kinds of threats and attacks. This paper presents an overview of different intrusions in cloud, various detection techniques used by IDS and the types of Cloud Computing based IDS. Then, we analyze some pertinent existing cloud based intrusion detection systems with respect to their various types, positioning, detection time and data source. The analysis also gives strengths of each system, and limitations, in order to evaluate whether they carry out the security requirements of cloud computing environment or not. We highlight the deployment of IDS that uses multiple detection approaches to deal with security challenges in cloud.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Virtualization in Intrusion Detection Systems: A Study on Different Approaches for Cloud Computing Environments
    Araujo, Josenilson Dias
    Abdelouahab, Zair
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (11): : 135 - 142
  • [42] Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
    Achbarou, Omar
    El Kiram, My Ahmed
    El Bouanani, Salim
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (03): : 61 - 64
  • [43] Review on State of Art Intrusion Detection Systems Designed for the Cloud Computing Paradigm
    Premathilaka, Nalaka Arjuna
    Aponso, Achala Chathuranga
    Krishnarajah, Naomi
    2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
  • [44] Virtualization in Intrusion Detection Systems: A Study on Different Approaches for Cloud Computing Environments
    Araujo, Josenilson Dias
    Abdelouahab, Zair
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (11): : 9 - 16
  • [45] Scalable Intrusion Detection Systems Log Analysis using Cloud Computing Infrastructure
    Kumar, Manish
    Hanumanthappa, M.
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 206 - 209
  • [46] A SURVEY ON QOS IN CLOUD COMPUTING ENVIRONMENT
    Deepshikha
    Prakash, Shiva
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 574 - 578
  • [47] Unsupervised Outlier Detection Technique for Intrusion Detection in Cloud Computing
    Kumar, Manoj
    Mathur, Robin
    2014 INTERNATIONAL CONFERENCE FOR CONVERGENCE OF TECHNOLOGY (I2CT), 2014,
  • [48] Intrusion detection in Cloud Internet of Things Environment
    Rebbah, Mohammed
    Rebbah, Dhiaa El Hak
    Smail, Omar
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MATHEMATICS AND INFORMATION TECHNOLOGY (ICMIT), 2017, : 65 - 70
  • [49] Efficient Approaches for Intrusion Detection in Cloud Environment
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1211 - 1216
  • [50] Virtual Intrusion Detection Systems in the Cloud
    Donadio, Pasquale
    BELL LABS TECHNICAL JOURNAL, 2012, 17 (03) : 113 - 128