DocumentCode :
678216
Title :
Intrusion Detection System in Cloud Computing: Challenges and opportunities
Author :
Mehmood, Yasir ; Habiba, Ummy ; Shibli, M.A. ; Masood, R.
Author_Institution :
SEECS, Nat. Univ. of Sci. & Technol., Islamabad, Pakistan
fYear :
2013
fDate :
11-12 Dec. 2013
Firstpage :
59
Lastpage :
66
Abstract :
Today, Cloud Computing is the preferred choice of every IT organization since it provides flexible and pay-per-use based services to its users. However, the security and privacy is a major hurdle in its success because of its open and distributed architecture that is vulnerable to intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect attacks on cloud. This paper provides an overview of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems (IDS) with respect to their type, positioning, detection time, detection technique, data source and attacks they can detect. The analysis also provides limitations of each technique to evaluate whether they fulfill the security requirements of cloud computing environment or not. We emphasize the deployment of IDS that uses multiple detection methods to cope with security challenges in cloud.
Keywords :
cloud computing; computer crime; data privacy; IDS; IT organization; attacks detection; cloud based intrusion detection systems; cloud computing; data source; detection technique; detection time; distributed architecture; open architecture; pay-per-use based services; positioning; privacy; security requirements; Cloud computing; Computer crime; Intrusion detection; Ports (Computers); Servers; Virtual machine monitors; Anomaly; Cloud Computing; Cloud Security; Intrusion Detection System; Signature;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance (NCIA), 2013 2nd National Conference on
Conference_Location :
Rawalpindi
Print_ISBN :
978-1-4799-1287-2
Type :
conf
DOI :
10.1109/NCIA.2013.6725325
Filename :
6725325
Link To Document :
بازگشت