Review Paper on Attack Type and Intrusion Detection System in Cloud Computing

Authors

  • Manoj Kumar Soni M. Tech Scholar,Department of ComputerScience ,CIIT, Indore (M.P.), India
  • Megha Singh H.O.D., Department of Computer Science, CIIT, Indore (M.P.), India

DOI:

https://doi.org/10.53555/nncse.v2i4.455

Keywords:

Firewall, Cloud, IDS, Security, Attacks, Host

Abstract

In any information system intrusions are the activities that damage the security and integrity of the system. Over the past few decades the network based system has grown at an explosive rate with innovations in communication and information technologies. While the computer network and their related applications brought the world together by bridging the information gap among people, it has also made it easier to leads unauthorized activity not only from external attackers but also from internal attackers, such as disgruntled employees and people abusing their privileges for personal gain. In this review paper we will try to traverse Cloud, Characteristics of Cloud, Application of Cloud, and Security issues related to Cloud. There is technique IDS which is used to detect Intrusion, we have to study this system with cloud computing concern. IDS should be used on Cloud model in a very effective way to sort out some security related challenges.

References

Voorsluys, William; Broberg, James; Buyya, Rajkumar (February 2011). "Introduction to Cloud Computing". In R. Buyya, J. Broberg, A.Goscinski. Cloud Computing: Principles and Paradigms. New York, USA: Wiley Press. pp. 1–44. ISBN 978-0-470-88799-8.

"The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011.

"Is the Private Cloud Really More Securing?” CloudAndCompute.com. Retrieved 12 October 2014.

Haff, Gordon (2009-01-27). "Just don't call them private clouds". CNET News. Retrieved 2010-08-22.

"There's No Such Thing As A Private Cloud". InformationWeek. 2010-06-30. Retrieved 2010-08-22.

Rouse, Margaret. "What is public cloud?". Definition from Whatis.com. Retrieved 12 October 2014.

"Defining 'Cloud Services' and "Cloud Computing"". IDC. 2008-09-23. Retrieved 2010-08-22.

Data Security Monitoring in the Cloud: Challenges and Solutions, by Jeffrey Wheatman, 23 April 2012

Research on Intrusion Detection and Response: A Survey, International Journal of Network Security, Vol.1, No.2, PP.84–102,

Sep. 2005 (http://isrc.nchu.edu.tw/ijns/).

H.Debar, M.Dacier, A.Wespi, “Towards a Taxonomy of Intrusion Detection Systems”,Elsevier Science B.V 31 (1999) 805-822

Firewall design and implementation and ISO 17799 and PCI compliance by Phil Cox.

Recent Trends in Security Techniques for Detecting Suspicious Activities in Computer Network: A Survey, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 12, December 2014

Comparative study of various Distributed Intrusion Detection Systems for WLAN, Volume 12 Issue 6 Version 1.0 May 2012

Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 2249-4596

& Print ISSN: 0975-5861

Downloads

Published

2015-04-30

How to Cite

Soni, M. K., & Singh, M. (2015). Review Paper on Attack Type and Intrusion Detection System in Cloud Computing. Journal of Advance Research in Computer Science & Engineering (ISSN 2456-3552), 2(4), 21-25. https://doi.org/10.53555/nncse.v2i4.455