DocumentCode
713068
Title
A review on intrusion detection techniques for cloud computing and security challenges
Author
Kene, Snehal G. ; Theng, Deepti P.
Author_Institution
Dept. of Comput. Sci. & Eng., G.H. Raisoni Coll. of Eng., Nagpur, India
fYear
2015
fDate
26-27 Feb. 2015
Firstpage
227
Lastpage
232
Abstract
Nowadays, Cloud Computing is the first choice of every IT organization because of its scalable and flexible nature. However, the security and privacy is a major concern in its success because of its open and distributed architecture that is open for intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect various attacks on cloud. This paper shares an overview of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems with respect to their various types, positioning, detection time, detection techniques, data source and attacks. The analysis also provides limitations of each technique to determine whether they fulfill the security needs of cloud computing environment or not. We highlight the deployment of IDS that uses multiple detection methods to manage with security challenges in cloud.
Keywords
cloud computing; security of data; IDS; cloud computing; intrusion detection techniques; multiple detection methods; security challenges; Cloud computing; Computer crime; Intrusion detection; Real-time systems; Virtual machine monitors; Virtual machining; Anomaly; Cloud Computing; Cloud Security; Intrusion Detection System; Signature;
fLanguage
English
Publisher
ieee
Conference_Titel
Electronics and Communication Systems (ICECS), 2015 2nd International Conference on
Conference_Location
Coimbatore
Print_ISBN
978-1-4799-7224-1
Type
conf
DOI
10.1109/ECS.2015.7124898
Filename
7124898
Link To Document