ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Understanding of Intrusion Detection System for Cloud Computing with Networking System

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.9, No. 3)

Publication Date:

Authors : ; ;

Page : 19-25

Keywords : Cloud Computing; Cloud Security; Intrusion Detection System; Network;

Source : Downloadexternal Find it from : Google Scholarexternal


Today, Cloud Computing is the preferred choice of every IT organization since it provides flexible and pay-per-use based services to its users. However, the security and privacy is a major hurdle in its success because of its open and distributed architecture that is vulnerable to intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect attacks on cloud. This paper provides an overview of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems (IDS) with respect to their type, positioning, detection time, detection technique, data source and attacks they can detect. The analysis also provides limitations of each technique to evaluate whether they fulfill the security requirements of cloud computing environment or not. We emphasize the deployment of IDS that uses multiple detection methods to cope with security challenges in cloud. A standard product provides centralized management, visibility, and control of the network. This could include the management of distributed wireless access routers or branch-office devices using centralized management in the cloud. The goal is to create and manage secure private networks by using WAN connections and a centralized management function that can reside in a data center. Connectivity, security, management, and control are pushed to the cloud and delivered as a service.

Last modified: 2020-03-07 23:43:15