A Survey on Intrusion Detection Systems for Cloud Computing Environment

  • Kumar U
  • N. Gohil B
N/ACitations
Citations of this article
29Readers
Mendeley users who have this article in their library.

Abstract

Cloud Computing is a newly emerged technology. It is getting popularity day by day due to its amazing services. The applications and services based on the cloud are emerging day by day. Due to networked nature of the cloud, resources, data and applications are vulnerable to the attack in cloud environment. So Intrusion Detection Systems (IDS) are employed in the cloud to detect malicious behaviour in the network and in the host. IDS monitors network or host system activities by collecting network information, and analyzes this information for malicious activities and generate alarms, if intrusion takes place. In this paper we surveyed various types of Intrusion Detection Systems proposed over the years for Cloud Computing environment.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Kumar, U., & N. Gohil, B. (2015). A Survey on Intrusion Detection Systems for Cloud Computing Environment. International Journal of Computer Applications, 109(1), 6–15. https://doi.org/10.5120/19150-0573

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 13

62%

Researcher 4

19%

Professor / Associate Prof. 2

10%

Lecturer / Post doc 2

10%

Readers' Discipline

Tooltip

Computer Science 16

76%

Engineering 3

14%

Social Sciences 1

5%

Economics, Econometrics and Finance 1

5%

Save time finding and organizing research with Mendeley

Sign up for free