Intrusion Detection System in Cloud Computing: A Literature Review

Kezang Dema, Naghmeh Moradpoor, Thinley Jamtsho

Abstract


Cloud computing provide users a convenient, ubiquitous and on-demand network access to a shared pool of computing resources over an Internet. On the other aspect, due to its distributed and complex architectures, it possess many security risks and become one of the attractive targets for the cyber-attacks by the intruders. With the growing popularity of cloud computing, the importance to provide reliable and secure services assurance remains one of the major issues. Intrusion Detection Systems (IDS) have been widely used as one of the mechanism to detect attacks on cloud. Different authors have proposed various IDS that can be used in cloud computing in an attempt to provide secure services.

This paper surveys different methods and approaches applied in intrusions detection systems (IDS) of cloud environment by various authors. The paper is organized as follows. Section 1 discusses about the different kinds of attacks or intrusions found in cloud. Section 2 discusses and demonstrates different IDS used in cloud that have been proposed by various authors in their research. Section 3 concludes the review with references at the end.

Keywords: Cloud computing, IDS, NIDS, HIDS, DIDS

DOI: 10.7176/NCS/12-05

Publication date: January 31st 2021


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: NCS@iiste.org

ISSN (Paper)2224-610X ISSN (Online)2225-0603

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org