Survey of intrusion detection techniques and architectures in cloud computing Online publication date: Tue, 22-Jan-2019
by Pinki Sharma; Jyotsna Sengupta; P.K. Suri
International Journal of High Performance Computing and Networking (IJHPCN), Vol. 13, No. 2, 2019
Abstract: Cloud computing yields more utilisation of resources and hence a reasonable service access cost to end users. Cloud computing, virtually and dynamically, provides the data resources to a variety of users. As cloud computing is a shared facility, it is vulnerable to various attacks. The cloud networks have their own features which are the reason for threats to the security in clouds. The best solution to protect the cloud from the attacks is use of intrusion detection systems (IDS). This system is a better solution to achieve higher level of security, and is the most widely used technique where the system consists of IDS connected over the network in combination with various anomaly detection techniques. This paper provides an extensive survey of various cloud-based IDS architectures implemented in cloud environments for dealing with various security issues.
Online publication date: Tue, 22-Jan-2019
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of High Performance Computing and Networking (IJHPCN):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.If you still need assistance, please email email@example.com