Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions

Adnan Kiani

Research output: Contribution to journalArticlepeer-review

17 Citations (Scopus)

Abstract

Rapid growth of resources and escalating cost of infrastructure is leading organizations to adopt cloud computing. Cloud computing provides high performance, efficient utilization, and on-demand availability of resources. However, the cloud environment is vulnerable to different kinds of intrusion attacks which involve installing malicious software and creating backdoors. In a cloud environment, where businesses have hosted important and critical data, the security of underlying technologies becomes crucial. To mitigate the threat to cloud environments, Intrusion Detection Systems (IDS) are a layer of defense. The aim of this survey paper is to review IDS techniques proposed for the cloud. To achieve this objective, the first step is defining the limitations and unique characteristics of each technique. The second step is establishing the criteria to evaluate IDS architectures. In this paper, the criteria used is derived from basic characteristics of cloud. Next step is a comparative analysis of various existing intrusion detection techniques against the criteria. The last step is on the discussion of drawbacks and open issues, comprehended from the evaluation, due to which implementation of IDS in cloud environment face hurdles.
Original languageEnglish
Pages (from-to)611-634
JournalJournal of Information Science and Engineering
Publication statusPublished - 1 May 2017
Externally publishedYes

Fingerprint

Dive into the research topics of 'Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions'. Together they form a unique fingerprint.

Cite this