JISE


  [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ]


Journal of Information Science and Engineering, Vol. 33 No. 3, pp. 611-634


Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions


AMNA RIAZ1, HAFIZ FAROOQ AHMAD2, ADNAN KHAILD KIANI1, JUNAID QADIR3
RAIHAN UR RASOOL1,2,5,+ AND USMAN YOUNIS1,4
1School of Electrical Engineering and Computer Science
National University of Sciences and Technology
Islamabad, 44000 Pakistan

2Department of Computer Science
King Faisal University
Al-Hofuf, 31982 Saudi Arabia

3Information Technology University
Lahore, 54000 Pakistan

4Department of Electrical and Computer Engineering
National University of Singapore
Singapore, 117583 Singapore

5Victoria University
Melbourne, 14428 Australia
E-mail:
+rrasool@kfu.edu.sa, raihan.rasool@seecs.edu.pk
 


Rapid growth of resources and escalating cost of infrastructure is leading organizations to adopt cloud computing. Cloud computing provides high performance, efficient utilization, and on-demand availability of resources. However, the cloud environment is vulnerable to different kinds of intrusion attacks which involve installing malicious software and creating backdoors. In a cloud environment, where businesses have hosted important and critical data, the security of underlying technologies becomes crucial. To mitigate the threat to cloud environments, Intrusion Detection Systems (IDS) are a layer of defense. The aim of this survey paper is to review IDS techniques proposed for the cloud. To achieve this objective, the first step is defining the limitations and unique characteristics of each technique. The second step is establishing the criteria to evaluate IDS architectures. In this paper, the criteria used is derived from basic characteristics of cloud. Next step is a comparative analysis of various existing intrusion detection techniques against the criteria. The last step is on the discussion of drawbacks and open issues, comprehended from the evaluation, due to which implementation of IDS in cloud environment face hurdles.


Keywords: intrusion detection systems, cyber-security, cloud computing, comparative analysis, open issues

  Retrieve PDF document (JISE_201703_02.pdf)