A Comparative Analysis of Different Intrusion Detection Techniques in Cloud Computing

4Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays, the foremost optimal choice of every IT organization is cloud computing. Cloud computing technology is very flexible and scalable in nature. The prime concern in cloud computing is its security and privacy, because intruders are trying to breach it. The main reason for breaching is its open and distributed architecture. For detection of various attacks on cloud, the most common mechanism used is Intrusion Detection System (IDS). We have presented a comparative analysis of some existing cloud based intrusion detection systems and different methods of deploying the IDS are used for overcoming the security challenges. In spite of the fact that there are various existing literatures in this area of study, we endeavor to give more intricate picture of a thorough analysis. This paper shares an overview of different intrusions in cloud. The metrics, which are used for comparative analysis, are of various types like positioning, detection time, detection techniques, data source and attacks. The comparative analysis also shows the limitations of each technique that tells whether the cloud-computing environment is secure or not.

Cite

CITATION STYLE

APA

Bakshi, A., & Sunanda. (2019). A Comparative Analysis of Different Intrusion Detection Techniques in Cloud Computing. In Communications in Computer and Information Science (Vol. 956, pp. 358–378). Springer Verlag. https://doi.org/10.1007/978-981-13-3143-5_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free