Title :
A review on intrusion detection techniques for cloud computing and security challenges
Author :
Kene, Snehal G. ; Theng, Deepti P.
Author_Institution :
Dept. of Comput. Sci. & Eng., G.H. Raisoni Coll. of Eng., Nagpur, India
Abstract :
Nowadays, Cloud Computing is the first choice of every IT organization because of its scalable and flexible nature. However, the security and privacy is a major concern in its success because of its open and distributed architecture that is open for intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect various attacks on cloud. This paper shares an overview of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems with respect to their various types, positioning, detection time, detection techniques, data source and attacks. The analysis also provides limitations of each technique to determine whether they fulfill the security needs of cloud computing environment or not. We highlight the deployment of IDS that uses multiple detection methods to manage with security challenges in cloud.
Keywords :
cloud computing; security of data; IDS; cloud computing; intrusion detection techniques; multiple detection methods; security challenges; Cloud computing; Computer crime; Intrusion detection; Real-time systems; Virtual machine monitors; Virtual machining; Anomaly; Cloud Computing; Cloud Security; Intrusion Detection System; Signature;
Conference_Titel :
Electronics and Communication Systems (ICECS), 2015 2nd International Conference on
Conference_Location :
Coimbatore
Print_ISBN :
978-1-4799-7224-1
DOI :
10.1109/ECS.2015.7124898