Review Paper on Attack Type and Intrusion Detection System in Cloud Computing
DOI:
https://doi.org/10.53555/nncse.v2i4.455Keywords:
Firewall, Cloud, IDS, Security, Attacks, HostAbstract
In any information system intrusions are the activities that damage the security and integrity of the system. Over the past few decades the network based system has grown at an explosive rate with innovations in communication and information technologies. While the computer network and their related applications brought the world together by bridging the information gap among people, it has also made it easier to leads unauthorized activity not only from external attackers but also from internal attackers, such as disgruntled employees and people abusing their privileges for personal gain. In this review paper we will try to traverse Cloud, Characteristics of Cloud, Application of Cloud, and Security issues related to Cloud. There is technique IDS which is used to detect Intrusion, we have to study this system with cloud computing concern. IDS should be used on Cloud model in a very effective way to sort out some security related challenges.
References
Voorsluys, William; Broberg, James; Buyya, Rajkumar (February 2011). "Introduction to Cloud Computing". In R. Buyya, J. Broberg, A.Goscinski. Cloud Computing: Principles and Paradigms. New York, USA: Wiley Press. pp. 1–44. ISBN 978-0-470-88799-8.
"The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011.
"Is the Private Cloud Really More Securing?” CloudAndCompute.com. Retrieved 12 October 2014.
Haff, Gordon (2009-01-27). "Just don't call them private clouds". CNET News. Retrieved 2010-08-22.
"There's No Such Thing As A Private Cloud". InformationWeek. 2010-06-30. Retrieved 2010-08-22.
Rouse, Margaret. "What is public cloud?". Definition from Whatis.com. Retrieved 12 October 2014.
"Defining 'Cloud Services' and "Cloud Computing"". IDC. 2008-09-23. Retrieved 2010-08-22.
Data Security Monitoring in the Cloud: Challenges and Solutions, by Jeffrey Wheatman, 23 April 2012
Research on Intrusion Detection and Response: A Survey, International Journal of Network Security, Vol.1, No.2, PP.84–102,
Sep. 2005 (http://isrc.nchu.edu.tw/ijns/).
H.Debar, M.Dacier, A.Wespi, “Towards a Taxonomy of Intrusion Detection Systems”,Elsevier Science B.V 31 (1999) 805-822
Firewall design and implementation and ISO 17799 and PCI compliance by Phil Cox.
Recent Trends in Security Techniques for Detecting Suspicious Activities in Computer Network: A Survey, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 12, December 2014
Comparative study of various Distributed Intrusion Detection Systems for WLAN, Volume 12 Issue 6 Version 1.0 May 2012
Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 2249-4596
& Print ISSN: 0975-5861
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.