Title: Survey of intrusion detection techniques and architectures in cloud computing

Authors: Pinki Sharma; Jyotsna Sengupta; P.K. Suri

Addresses: Department of Computer Science, Punjabi University, Patiala, Punjab, India ' Department of Computer Science, Punjabi University, Patiala, Punjab, India ' Computer Science and Application Department, Kurukshetra University, Kurukshetra, Haryana, India; Department of Computer Science and Engineering and Department of Computer Science and Application, HCTM Technical Campus Kaithal, Haryana, India

Abstract: Cloud computing yields more utilisation of resources and hence a reasonable service access cost to end users. Cloud computing, virtually and dynamically, provides the data resources to a variety of users. As cloud computing is a shared facility, it is vulnerable to various attacks. The cloud networks have their own features which are the reason for threats to the security in clouds. The best solution to protect the cloud from the attacks is use of intrusion detection systems (IDS). This system is a better solution to achieve higher level of security, and is the most widely used technique where the system consists of IDS connected over the network in combination with various anomaly detection techniques. This paper provides an extensive survey of various cloud-based IDS architectures implemented in cloud environments for dealing with various security issues.

Keywords: security; cloud computing; intrusion detection system; IDS; intrusion detection techniques; intrusion detection architecture.

DOI: 10.1504/IJHPCN.2019.097510

International Journal of High Performance Computing and Networking, 2019 Vol.13 No.2, pp.184 - 198

Available online: 22 Jan 2019 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article