Abstract
Cloud computing is emerging as a powerful solution to ever-growing storage and processing requirements of an organization and individual without the burden of owning and handling the physical devices. Security is one of the primary concerns in cloud computing for large-scale implementation. Intrusion detection and prevention (IDP) techniques can be applied to secure against intruders. In this paper, we have studied different IDP techniques comprehensively and analyzed their respective strengths and weaknesses on various parameters to provide security in cloud computing. Hypervisor-based and distributed IDS have shown promising security features in cloud computing environment in comparison with traditional IDP techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Panko R (2017) The cloud in 2017: trends in security. https://clutch.co/cloud/resources/cloud-computing-security-survey-2017
Bokhari MU, Alam S, Hasan SH (2014) A detailed analysis of Grain family of stream ciphers. Int J Comput Netw Inf Secur 6:34–40
Mishra P, Pilli ES, Varadharajan V, Tupakula U (2017) Intrusion detection techniques in cloud environment: a survey. J Netw Comput Appl 77:18–47
Hatef MA, Shaker V, Jabbarpour MR, Jung J (2017) Zarrabi H (2017) HIDCC: a hybrid intrusion detection approach in cloud computing. Concurrency Comput Pract Experience 30:e4171
Samad A, Alam S, Mohammed S, Bhukhari MU (2018) Internet of vehicles (IoV) requirements, attacks and countermeasures. In: Proceedings of 12th INDIACom; INDIACom-2018; 5th international conference on “computing for sustainable global development” IEEE conference, New Delhi (2018)
Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115
Samad A, Shuaib M, Beg MR (2017) Monitoring of military base station using flooding and ACO technique: an efficient approach. Int J Comput Netw Inf Secur 9:36–44
Flynn L, Huth C, Buttles-Valdez P, Theis M, Silowash G, Cassidy T, Wright T, Trzeciak R (2014) International implementation of best practices for mitigating insider threat: analyses for India and Germany (2014)
Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36(1):42–57
Roberts JC, Al-Hamdani W (2011) Who can you trust in the cloud? In: Proceedings of the 2011 information security curriculum development conference on InfoSecCD 11 (2011)
Ernst J, Hamed T, Kremer S (2017) A survey and comparison of performance evaluation in intrusion detection systems. In: Computer and network security essentials, pp 555–568
Modi CN, Acha K (2016) Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review. J Supercomput 73:1192–1234
Jouad M, Diouani S, Houmani H, Zaki A (2015) Security challenges in intrusion detection. In: 2015 international conference on cloud technologies and applications (CloudTech), pp 1–11
Pandeeswari N, Kumar G (2015) Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mobile Netw Appl 21:494–505
Ibrahim LM (2010) Anomaly network intrusion detection system based on distributed time-delay neural network (DTDNN). J Eng Sci Technol 5(4):457–471
Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutorials 18:1153–1176
Desai AS, Gaikwad DP (2016) Real-time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA. In: 2016 IEEE international conference on advances in electronics, communication and computer technology (ICAECCT)
Morin B, Mé L, Debar H, Ducassé M (2009) A logic-based model to support alert correlation in intrusion detection. Inf Fusion 10:285–299
Oktay U, Sahingoz OK (2013) Proxy network intrusion detection system for cloud computing. In: 2013 the international conference on technological advances in electrical, electronics and computer engineering (TAEECE)
Rahim ER (2012) Information security in the internet age. In: Beyond data protection, pp 157–186
Scarfone KA, Mell PM (2007) Guide to intrusion detection and prevention systems (IDPS)
Das SK, Kant K, Zhang N (2012) Handbook on securing cyber-physical critical infrastructure. Morgan Kaufmann, San Francisco, CA
Shuaib M, Samad A, Siddiqui ST (2017) Multi-layer security analysis of hybrid cloud. In: 6th international conference on system modeling & advancement in research trends. IEEE, pp 526–531
Platonov VV, Semenov PO (2017) An adaptive model of a distributed intrusion detection system. Autom Control Comput Sci 51(8):894–898
Gurkok C (2013) Chapter 6—Securing cloud computing systems. In: Vacca JR (ed) Computer and information security handbook, 2nd edn. Morgan Kaufmann, Boston, pp 97–123
Khorshed MT, Ali AS, Wasimi SA (2011) Trust issues that create threats for cyber attacks in cloud computing. In: 2011 IEEE 17th international conference on parallel and distributed systems
Manvi SS, Shyam GK (2014) Resource management for Infrastructure as a Service (IaaS) in cloud computing: a survey. J Netw Comput Appl 41:424–440
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Alam, S., Shuaib, M., Samad, A. (2019). A Collaborative Study of Intrusion Detection and Prevention Techniques in Cloud Computing. In: Bhattacharyya, S., Hassanien, A., Gupta, D., Khanna, A., Pan, I. (eds) International Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems, vol 55. Springer, Singapore. https://doi.org/10.1007/978-981-13-2324-9_23
Download citation
DOI: https://doi.org/10.1007/978-981-13-2324-9_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2323-2
Online ISBN: 978-981-13-2324-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)