IDS: Survey on Intrusion Detection System in Cloud Computing

Cloud computing provides flexible on demand services to the end users with lesser infrastructural investment. Under the supervision of different managements, these services are provided over the Internet using known networking protocols, standards and formats. Existing deficiencies in underlying technologies tend to open doors for intrusion. This paper surveys different intrusions affecting basics of cloud security i.e. availability, confidentiality and integrity of Cloud resources and services. It examines proposals incorporating Intrusion Detection Systems (IDS) in Cloud and discusses various types and techniques of IDS.

[1]  Peter Mell,et al.  Intrusion Detection Systems , 2001 .

[2]  Irfan Gul,et al.  Distributed Cloud Intrusion Detection Model , 2011 .

[3]  Mukesh Singhal,et al.  Information flow control in cloud computing , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).

[4]  Manas Ranjan Patra,et al.  A Service Oriented Architectural Design for Building Intrusion Detection Systems , 2009 .

[5]  Pritesh Jain,et al.  A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment , 2011, 2011 World Congress on Information and Communication Technologies.

[6]  Sugata Sanyal,et al.  A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.

[7]  Ying Chen,et al.  Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.

[8]  Sawan Kumar,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[9]  John McHugh,et al.  Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.

[10]  Harley Kozushko,et al.  Intrusion Detection : Host-Based and Network-Based Intrusion Detection Systems , 2003 .

[11]  Zaigham Mahmood Cloud Computing: Characteristics and Deployment Approaches , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.

[12]  Urjita Thakar,et al.  HoneyAnalyzer – Analysis and Extraction of Intrusion Detection Patterns & Signatures Using Honeypot , 2005 .

[13]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[14]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[15]  Peter Mell,et al.  NIST Special Publication on Intrusion Detection Systems , 2001 .