• DocumentCode
    713068
  • Title

    A review on intrusion detection techniques for cloud computing and security challenges

  • Author

    Kene, Snehal G. ; Theng, Deepti P.

  • Author_Institution
    Dept. of Comput. Sci. & Eng., G.H. Raisoni Coll. of Eng., Nagpur, India
  • fYear
    2015
  • fDate
    26-27 Feb. 2015
  • Firstpage
    227
  • Lastpage
    232
  • Abstract
    Nowadays, Cloud Computing is the first choice of every IT organization because of its scalable and flexible nature. However, the security and privacy is a major concern in its success because of its open and distributed architecture that is open for intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect various attacks on cloud. This paper shares an overview of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems with respect to their various types, positioning, detection time, detection techniques, data source and attacks. The analysis also provides limitations of each technique to determine whether they fulfill the security needs of cloud computing environment or not. We highlight the deployment of IDS that uses multiple detection methods to manage with security challenges in cloud.
  • Keywords
    cloud computing; security of data; IDS; cloud computing; intrusion detection techniques; multiple detection methods; security challenges; Cloud computing; Computer crime; Intrusion detection; Real-time systems; Virtual machine monitors; Virtual machining; Anomaly; Cloud Computing; Cloud Security; Intrusion Detection System; Signature;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electronics and Communication Systems (ICECS), 2015 2nd International Conference on
  • Conference_Location
    Coimbatore
  • Print_ISBN
    978-1-4799-7224-1
  • Type

    conf

  • DOI
    10.1109/ECS.2015.7124898
  • Filename
    7124898