Review Paper on Attack Type and Intrusion Detection System in Cloud Computing
DOI:
https://doi.org/10.53555/nncse.v2i4.455Keywords:
Firewall, Cloud, IDS, Security, Attacks, HostAbstract
In any information system intrusions are the activities that damage the security and integrity of the system. Over the past few decades the network based system has grown at an explosive rate with innovations in communication and information technologies. While the computer network and their related applications brought the world together by bridging the information gap among people, it has also made it easier to leads unauthorized activity not only from external attackers but also from internal attackers, such as disgruntled employees and people abusing their privileges for personal gain. In this review paper we will try to traverse Cloud, Characteristics of Cloud, Application of Cloud, and Security issues related to Cloud. There is technique IDS which is used to detect Intrusion, we have to study this system with cloud computing concern. IDS should be used on Cloud model in a very effective way to sort out some security related challenges.
References
Voorsluys, William; Broberg, James; Buyya, Rajkumar (February 2011). "Introduction to Cloud Computing". In R. Buyya, J. Broberg, A.Goscinski. Cloud Computing: Principles and Paradigms. New York, USA: Wiley Press. pp. 1–44. ISBN 978-0-470-88799-8.
"The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011.
"Is the Private Cloud Really More Securing?” CloudAndCompute.com. Retrieved 12 October 2014.
Haff, Gordon (2009-01-27). "Just don't call them private clouds". CNET News. Retrieved 2010-08-22.
"There's No Such Thing As A Private Cloud". InformationWeek. 2010-06-30. Retrieved 2010-08-22.
Rouse, Margaret. "What is public cloud?". Definition from Whatis.com. Retrieved 12 October 2014.
"Defining 'Cloud Services' and "Cloud Computing"". IDC. 2008-09-23. Retrieved 2010-08-22.
Data Security Monitoring in the Cloud: Challenges and Solutions, by Jeffrey Wheatman, 23 April 2012
Research on Intrusion Detection and Response: A Survey, International Journal of Network Security, Vol.1, No.2, PP.84–102,
Sep. 2005 (http://isrc.nchu.edu.tw/ijns/).
H.Debar, M.Dacier, A.Wespi, “Towards a Taxonomy of Intrusion Detection Systems”,Elsevier Science B.V 31 (1999) 805-822
Firewall design and implementation and ISO 17799 and PCI compliance by Phil Cox.
Recent Trends in Security Techniques for Detecting Suspicious Activities in Computer Network: A Survey, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 12, December 2014
Comparative study of various Distributed Intrusion Detection Systems for WLAN, Volume 12 Issue 6 Version 1.0 May 2012
Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 2249-4596
& Print ISSN: 0975-5861
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Terms & Condition
Submission -
Author can submit the manuscript through our online submission process or email us at the designated email id in contact details.
The other mode of submission not accepted than online and email.
Before submission please read the submission guidelines.
NN Publication accepts only article submitted in pdf/doc/docx/rtf file format. Another format except given file formats will no be considered .
Author will be responsible for the error mistakes in the submission files. The minor changes can be done without any cost after publication. But for major changes NN Publication may charges you the editing charges.
Publication (Online) -
The online publication is scheduled on last date of every month, but it can be delayed by 24 to 48 hours due to editorial process if huge number of articles comes to publish in single issue.
Automatic notificatation email will be sent to the all users on publication of an issue, so its author’s duty to check their email inbox or SPAM folder to get this notification.
After publication of article author can not withdraw their article.
If editor’s found any issue after publication of article then the NN Publication have the authority to remove the article from online website.
No refund will be provided after online publication of article.
Publication (Print) -
The print copy publication are sent as per the author’s request after 2 weeks of online publication of that issue.
NN Publication will ship the article by India Post and provide the consignment number on dispatch of print copy.
NN Publication follows all the guidelines of delivery provided by IndiaPost and hence not responsible for delay in delivery due to any kind of reasons.
Refund of hard copy will not be provided after dispatch or print of the journal.
NN Publication will be responsible for raise a complain if there is any issue occurs in delivery, but still will not be responsible for providing the refund.
NN Publication will be responsible to resend the print copy only and only if the print copy is lost or print copy is damaged in delivery / or there is delay more than 6 months.
According to India Post the delivery should be completed with in 1-3 weeks after dispatch of articles.
Privacy Policy-
NN Publicationl uses the email ids of authors and editors and readers for sending editorial or publication notification only, we do not reveal or sell the email ids to any other website or company.