Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview

29Citations
Citations of this article
45Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Cloud computing paradigm is growing rapidly, and it allows users to get services via the Internet as pay-per-use and it is convenient for developing, deploying, and accessing mobile applications. Currently, security is a requisite concern owning to the open and distributed nature of the cloud. Copious amounts of data are responsible for alluring hackers. Thus, developing efficacious IDS is an imperative task. This article analyzed four intrusion detection systems for the detection of attacks. Two standard benchmark datasets, namely, NSL-KDD and UNSW-NB15, were used for the simulations. Additionally, this study highlights the proliferating challenges for the security of sensitive user data and gives useful recommendations to address the identified issues. Finally, the projected results show that the hybridization method with support vector machine classifier outperforms the existing techniques in the case of the datasets investigated.

Cite

CITATION STYLE

APA

Rana, P., Batra, I., Malik, A., Imoize, A. L., Kim, Y., Pani, S. K., … Rho, S. (2022). Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview. Complexity. Hindawi Limited. https://doi.org/10.1155/2022/3999039

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free