A survey of intrusion detection techniques in Cloud

A survey of intrusion detection techniques in Cloud

2013 | Chirag Modi, Dhiren Patel, Hiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan
This paper provides a comprehensive survey of intrusion detection techniques in cloud computing environments. It highlights the vulnerabilities and security challenges posed by cloud services, such as IP spoofing, routing protocol attacks, and denial of service (DoS) attacks. The paper discusses various types of intrusions, including insider attacks, flooding attacks, user-to-root attacks, port scanning, attacks on virtual machines (VMs) or hypervisors, and backdoor channel attacks. It also reviews traditional firewall solutions and their limitations in detecting certain types of attacks. The paper then explores different intrusion detection systems (IDS) and intrusion prevention systems (IPS), including signature-based detection, anomaly detection, and hybrid techniques. It examines the strengths and weaknesses of each approach and their suitability for cloud environments. The paper also discusses the placement of IDS/IPS in cloud architecture to achieve effective security. Finally, the paper reviews existing IDS/IPS types used in cloud computing, such as host-based IDS (HIDS), network-based IDS (NIDS), hypervisor-based IDS, and distributed IDS (DIDS). It provides a detailed analysis of their deployment strategies and performance characteristics. The paper concludes by identifying several security challenges that need to be addressed to make cloud computing a secure and trusted platform.This paper provides a comprehensive survey of intrusion detection techniques in cloud computing environments. It highlights the vulnerabilities and security challenges posed by cloud services, such as IP spoofing, routing protocol attacks, and denial of service (DoS) attacks. The paper discusses various types of intrusions, including insider attacks, flooding attacks, user-to-root attacks, port scanning, attacks on virtual machines (VMs) or hypervisors, and backdoor channel attacks. It also reviews traditional firewall solutions and their limitations in detecting certain types of attacks. The paper then explores different intrusion detection systems (IDS) and intrusion prevention systems (IPS), including signature-based detection, anomaly detection, and hybrid techniques. It examines the strengths and weaknesses of each approach and their suitability for cloud environments. The paper also discusses the placement of IDS/IPS in cloud architecture to achieve effective security. Finally, the paper reviews existing IDS/IPS types used in cloud computing, such as host-based IDS (HIDS), network-based IDS (NIDS), hypervisor-based IDS, and distributed IDS (DIDS). It provides a detailed analysis of their deployment strategies and performance characteristics. The paper concludes by identifying several security challenges that need to be addressed to make cloud computing a secure and trusted platform.
Reach us at info@study.space
[slides and audio] A survey of intrusion detection techniques in Cloud