Affiliation:
1. Hassan II University of Casablanca, Morocco
Abstract
Security is a major challenge faced by cloud computing (CC) due to its open and distributed architecture. Hence, it is vulnerable and prone to intrusions that affect confidentiality, availability, and integrity of cloud resources and offered services. Intrusion detection system (IDS) has become the most commonly used component of computer system security and compliance practices that defends cloud environment from various kinds of threats and attacks. This chapter presents the cloud architecture, an overview of different intrusions in the cloud, the challenges and essential characteristics of cloud-based IDS (CIDS), and detection techniques used by CIDS and their types. Then, the authors analyze 24 pertinent CIDS with respect to their various types, positioning, detection time, and data source. The analysis also gives the strength of each system and limitations in order to evaluate whether they carry out the security requirements of CC environment or not.
Reference59 articles.
1. CloudIDS: Cloud intrusion detection model inspired by dendritic cell mechanism.;A.Ahmad;International Journal of Communication Networks and Information Security,2017
2. Applying hopfield artificial network and simulating annealing for cloud intrusion detection.;B.Al-Shdaifat;Journal of Information Security Research,2015
3. IDSaaS: Intrusion Detection System as a Service in Public Clouds
4. Cloud Security Engineering
5. Investigations of automatic methods for detecting the polymorphic worms signatures
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献