Loading…

Intrusion Detection System in Cloud Computing: Challenges and opportunities

Today, Cloud Computing is the preferred choice of every IT organization since it provides flexible and pay-per-use based services to its users. However, the security and privacy is a major hurdle in its success because of its open and distributed architecture that is vulnerable to intruders. Intrusi...

Full description

Saved in:
Bibliographic Details
Main Authors: Mehmood, Yasir, Habiba, Umme, Shibli, Muhammad Awais, Masood, Rahat
Format: Conference Proceeding
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c256t-3c6c1bb95f4361b2888cf94c333a04b4e7f3d11976652e90ea80ccc7eec405743
cites
container_end_page 66
container_issue
container_start_page 59
container_title
container_volume
creator Mehmood, Yasir
Habiba, Umme
Shibli, Muhammad Awais
Masood, Rahat
description Today, Cloud Computing is the preferred choice of every IT organization since it provides flexible and pay-per-use based services to its users. However, the security and privacy is a major hurdle in its success because of its open and distributed architecture that is vulnerable to intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect attacks on cloud. This paper provides an overview of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems (IDS) with respect to their type, positioning, detection time, detection technique, data source and attacks they can detect. The analysis also provides limitations of each technique to evaluate whether they fulfill the security requirements of cloud computing environment or not. We emphasize the deployment of IDS that uses multiple detection methods to cope with security challenges in cloud.
doi_str_mv 10.1109/NCIA.2013.6725325
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6725325</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6725325</ieee_id><sourcerecordid>6725325</sourcerecordid><originalsourceid>FETCH-LOGICAL-c256t-3c6c1bb95f4361b2888cf94c333a04b4e7f3d11976652e90ea80ccc7eec405743</originalsourceid><addsrcrecordid>eNotj71OwzAYRc2ABJQ-AGLxCyT43zFbZaBEVDAAc-U4X4pR4kSxM_TtAdHpnunoXIRuKCkpJebu1dabkhHKS6WZ5EyeoSsqtDGUVRW_QOuUvgkhVGspNLtEL3XM85LCGPEDZPD5j96PKcOAQ8S2H5cW23GYlhzi4R7bL9f3EA-QsIstHqdpnPMSQw6QrtF55_oE69Ou0OfT44d9LnZv29pudoVnUuWCe-Vp0xjZCa5o89tV-c4Izzl3RDQCdMdbSo1WSjIwBFxFvPcawAsiteArdPvvDQCwn-YwuPm4P_3lP8liS-A</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Intrusion Detection System in Cloud Computing: Challenges and opportunities</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Mehmood, Yasir ; Habiba, Umme ; Shibli, Muhammad Awais ; Masood, Rahat</creator><creatorcontrib>Mehmood, Yasir ; Habiba, Umme ; Shibli, Muhammad Awais ; Masood, Rahat</creatorcontrib><description>Today, Cloud Computing is the preferred choice of every IT organization since it provides flexible and pay-per-use based services to its users. However, the security and privacy is a major hurdle in its success because of its open and distributed architecture that is vulnerable to intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect attacks on cloud. This paper provides an overview of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems (IDS) with respect to their type, positioning, detection time, detection technique, data source and attacks they can detect. The analysis also provides limitations of each technique to evaluate whether they fulfill the security requirements of cloud computing environment or not. We emphasize the deployment of IDS that uses multiple detection methods to cope with security challenges in cloud.</description><identifier>EISBN: 1479912883</identifier><identifier>EISBN: 9781479912889</identifier><identifier>EISBN: 9781479912872</identifier><identifier>EISBN: 1479912875</identifier><identifier>DOI: 10.1109/NCIA.2013.6725325</identifier><language>eng</language><publisher>IEEE</publisher><subject>Anomaly ; Cloud computing ; Cloud Security ; Computer crime ; Intrusion detection ; Intrusion Detection System ; Ports (Computers) ; Servers ; Signature ; Virtual machine monitors</subject><ispartof>2013 2nd National Conference on Information Assurance (NCIA), 2013, p.59-66</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c256t-3c6c1bb95f4361b2888cf94c333a04b4e7f3d11976652e90ea80ccc7eec405743</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6725325$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,2054,27912,54907</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6725325$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mehmood, Yasir</creatorcontrib><creatorcontrib>Habiba, Umme</creatorcontrib><creatorcontrib>Shibli, Muhammad Awais</creatorcontrib><creatorcontrib>Masood, Rahat</creatorcontrib><title>Intrusion Detection System in Cloud Computing: Challenges and opportunities</title><title>2013 2nd National Conference on Information Assurance (NCIA)</title><addtitle>NCIA</addtitle><description>Today, Cloud Computing is the preferred choice of every IT organization since it provides flexible and pay-per-use based services to its users. However, the security and privacy is a major hurdle in its success because of its open and distributed architecture that is vulnerable to intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect attacks on cloud. This paper provides an overview of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems (IDS) with respect to their type, positioning, detection time, detection technique, data source and attacks they can detect. The analysis also provides limitations of each technique to evaluate whether they fulfill the security requirements of cloud computing environment or not. We emphasize the deployment of IDS that uses multiple detection methods to cope with security challenges in cloud.</description><subject>Anomaly</subject><subject>Cloud computing</subject><subject>Cloud Security</subject><subject>Computer crime</subject><subject>Intrusion detection</subject><subject>Intrusion Detection System</subject><subject>Ports (Computers)</subject><subject>Servers</subject><subject>Signature</subject><subject>Virtual machine monitors</subject><isbn>1479912883</isbn><isbn>9781479912889</isbn><isbn>9781479912872</isbn><isbn>1479912875</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj71OwzAYRc2ABJQ-AGLxCyT43zFbZaBEVDAAc-U4X4pR4kSxM_TtAdHpnunoXIRuKCkpJebu1dabkhHKS6WZ5EyeoSsqtDGUVRW_QOuUvgkhVGspNLtEL3XM85LCGPEDZPD5j96PKcOAQ8S2H5cW23GYlhzi4R7bL9f3EA-QsIstHqdpnPMSQw6QrtF55_oE69Ou0OfT44d9LnZv29pudoVnUuWCe-Vp0xjZCa5o89tV-c4Izzl3RDQCdMdbSo1WSjIwBFxFvPcawAsiteArdPvvDQCwn-YwuPm4P_3lP8liS-A</recordid><startdate>20131201</startdate><enddate>20131201</enddate><creator>Mehmood, Yasir</creator><creator>Habiba, Umme</creator><creator>Shibli, Muhammad Awais</creator><creator>Masood, Rahat</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20131201</creationdate><title>Intrusion Detection System in Cloud Computing: Challenges and opportunities</title><author>Mehmood, Yasir ; Habiba, Umme ; Shibli, Muhammad Awais ; Masood, Rahat</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c256t-3c6c1bb95f4361b2888cf94c333a04b4e7f3d11976652e90ea80ccc7eec405743</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Anomaly</topic><topic>Cloud computing</topic><topic>Cloud Security</topic><topic>Computer crime</topic><topic>Intrusion detection</topic><topic>Intrusion Detection System</topic><topic>Ports (Computers)</topic><topic>Servers</topic><topic>Signature</topic><topic>Virtual machine monitors</topic><toplevel>online_resources</toplevel><creatorcontrib>Mehmood, Yasir</creatorcontrib><creatorcontrib>Habiba, Umme</creatorcontrib><creatorcontrib>Shibli, Muhammad Awais</creatorcontrib><creatorcontrib>Masood, Rahat</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mehmood, Yasir</au><au>Habiba, Umme</au><au>Shibli, Muhammad Awais</au><au>Masood, Rahat</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Intrusion Detection System in Cloud Computing: Challenges and opportunities</atitle><btitle>2013 2nd National Conference on Information Assurance (NCIA)</btitle><stitle>NCIA</stitle><date>2013-12-01</date><risdate>2013</risdate><spage>59</spage><epage>66</epage><pages>59-66</pages><eisbn>1479912883</eisbn><eisbn>9781479912889</eisbn><eisbn>9781479912872</eisbn><eisbn>1479912875</eisbn><abstract>Today, Cloud Computing is the preferred choice of every IT organization since it provides flexible and pay-per-use based services to its users. However, the security and privacy is a major hurdle in its success because of its open and distributed architecture that is vulnerable to intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect attacks on cloud. This paper provides an overview of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems (IDS) with respect to their type, positioning, detection time, detection technique, data source and attacks they can detect. The analysis also provides limitations of each technique to evaluate whether they fulfill the security requirements of cloud computing environment or not. We emphasize the deployment of IDS that uses multiple detection methods to cope with security challenges in cloud.</abstract><pub>IEEE</pub><doi>10.1109/NCIA.2013.6725325</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISBN: 1479912883
ispartof 2013 2nd National Conference on Information Assurance (NCIA), 2013, p.59-66
issn
language eng
recordid cdi_ieee_primary_6725325
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Anomaly
Cloud computing
Cloud Security
Computer crime
Intrusion detection
Intrusion Detection System
Ports (Computers)
Servers
Signature
Virtual machine monitors
title Intrusion Detection System in Cloud Computing: Challenges and opportunities
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T18%3A31%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Intrusion%20Detection%20System%20in%20Cloud%20Computing:%20Challenges%20and%20opportunities&rft.btitle=2013%202nd%20National%20Conference%20on%20Information%20Assurance%20(NCIA)&rft.au=Mehmood,%20Yasir&rft.date=2013-12-01&rft.spage=59&rft.epage=66&rft.pages=59-66&rft_id=info:doi/10.1109/NCIA.2013.6725325&rft.eisbn=1479912883&rft.eisbn_list=9781479912889&rft.eisbn_list=9781479912872&rft.eisbn_list=1479912875&rft_dat=%3Cieee_6IE%3E6725325%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c256t-3c6c1bb95f4361b2888cf94c333a04b4e7f3d11976652e90ea80ccc7eec405743%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6725325&rfr_iscdi=true