2013 | Chirag Modi, Dhiren Patel, Hiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan
This paper surveys intrusion detection techniques in cloud computing, highlighting the challenges and solutions for securing cloud resources and services. Cloud computing offers scalable, virtualized services over the internet, but vulnerabilities in underlying technologies and protocols can lead to intrusions. The paper examines intrusion detection systems (IDS) and intrusion prevention systems (IPS) in cloud environments, discussing various types of attacks such as insider attacks, flooding attacks, user-to-root attacks, port scanning, and attacks on virtual machines (VMs) or hypervisors. It also explores backdoor channel attacks and the limitations of traditional firewalls in detecting these threats.
The paper discusses various IDS/IPS techniques, including signature-based detection, anomaly detection, artificial neural networks (ANN), fuzzy logic, association rule-based detection, support vector machines (SVM), and genetic algorithms (GA). These techniques are evaluated for their effectiveness in detecting known and unknown attacks in cloud environments. The paper also presents different types of IDS/IPS used in cloud computing, such as host-based, network-based, hypervisor-based, and distributed intrusion detection systems (DIDS). It emphasizes the importance of combining these techniques to enhance security and addresses the challenges of deploying and managing IDS/IPS in cloud environments.
The paper concludes that while no single solution is universally effective, the integration of soft computing techniques and hybrid approaches can significantly improve the security of cloud systems. It highlights the need for further research to develop robust and efficient intrusion detection and prevention mechanisms for cloud computing. The paper also discusses the role of cloud providers in ensuring the security of cloud environments and the importance of proper configuration and management of IDS/IPS systems. Overall, the paper provides a comprehensive overview of intrusion detection techniques in cloud computing and their potential to enhance the security of cloud-based services.This paper surveys intrusion detection techniques in cloud computing, highlighting the challenges and solutions for securing cloud resources and services. Cloud computing offers scalable, virtualized services over the internet, but vulnerabilities in underlying technologies and protocols can lead to intrusions. The paper examines intrusion detection systems (IDS) and intrusion prevention systems (IPS) in cloud environments, discussing various types of attacks such as insider attacks, flooding attacks, user-to-root attacks, port scanning, and attacks on virtual machines (VMs) or hypervisors. It also explores backdoor channel attacks and the limitations of traditional firewalls in detecting these threats.
The paper discusses various IDS/IPS techniques, including signature-based detection, anomaly detection, artificial neural networks (ANN), fuzzy logic, association rule-based detection, support vector machines (SVM), and genetic algorithms (GA). These techniques are evaluated for their effectiveness in detecting known and unknown attacks in cloud environments. The paper also presents different types of IDS/IPS used in cloud computing, such as host-based, network-based, hypervisor-based, and distributed intrusion detection systems (DIDS). It emphasizes the importance of combining these techniques to enhance security and addresses the challenges of deploying and managing IDS/IPS in cloud environments.
The paper concludes that while no single solution is universally effective, the integration of soft computing techniques and hybrid approaches can significantly improve the security of cloud systems. It highlights the need for further research to develop robust and efficient intrusion detection and prevention mechanisms for cloud computing. The paper also discusses the role of cloud providers in ensuring the security of cloud environments and the importance of proper configuration and management of IDS/IPS systems. Overall, the paper provides a comprehensive overview of intrusion detection techniques in cloud computing and their potential to enhance the security of cloud-based services.