Intrusion Detection Techniques Analysis in Cloud Computing

被引:0
|
作者
Qi, Wuqi [1 ]
Wu, Wei [1 ]
Wang, Hao [1 ]
Ou, Lu [1 ]
Hu, Ning [1 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Cloud Security; Intrusion Detection; Artificial Intelligence; Dataset;
D O I
10.1109/CloudNet59005.2023.10490069
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth and widespread usage of cloud computing have brought security concerns to the forefront. To tackle these concerns, extensive research and development efforts have been dedicated to intrusion detection techniques. This paper provides an investigation and analysis of the current state of intrusion detection techniques in cloud computing. It encompasses the classification of existing techniques and an examination of the security requirements specific to cloud computing. We systematically summarize the novel approaches to intrusion detection techniques in cloud computing and explore how artificial intelligence techniques can enhance intrusion detection. In terms of evaluating these techniques, we conduct a comparative analysis of the merits and limitations of available datasets. Lastly, we elucidate the challenges inherent to intrusion detection in the cloud and outline future research directions.
引用
收藏
页码:360 / 363
页数:4
相关论文
共 50 条
  • [21] Intrusion detection techniques in cloud environment: A survey
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 18 - 47
  • [22] INTRUSION DETECTION TECHNIQUES PERFORMANCE IN CLOUD ENVIRONMENTS
    Sabahi, Farzad
    PROCEEDINGS OF THE 2011 3RD INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2011), 2011, : 431 - 435
  • [23] Unsupervised Outlier Detection Technique for Intrusion Detection in Cloud Computing
    Kumar, Manoj
    Mathur, Robin
    2014 INTERNATIONAL CONFERENCE FOR CONVERGENCE OF TECHNOLOGY (I2CT), 2014,
  • [24] Scalable Intrusion Detection Systems Log Analysis using Cloud Computing Infrastructure
    Kumar, Manish
    Hanumanthappa, M.
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 206 - 209
  • [25] A Model for Adaptive and Distributed Intrusion Detection for Cloud Computing
    Ibrahim, Nurudeen Mahmud
    Zainal, Anazida
    2018 SEVENTH ICT INTERNATIONAL STUDENT PROJECT CONFERENCE (ICT-ISPC), 2018, : 12 - +
  • [26] Collaborative Intrusion Detection as a Service in Cloud Computing Environment
    Liang, Hong
    Ge, Yufei
    Wang, Wenjiao
    Chen, Lin
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 476 - 480
  • [27] A Cooperative Intrusion Detection Model for Cloud Computing Networks
    Teng, Shaohua
    Zheng, Chaoyu
    Zhu, Haibin
    Liu, Dongning
    Zhang, Wei
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 107 - 118
  • [28] Cloud computing for network security intrusion detection system
    Yang, J. (jinnyang@163.com), 1600, Academy Publisher (08):
  • [29] Proxy Network Intrusion Detection System for Cloud Computing
    Oktay, Ueman
    Sahingoz, Ozgur Koray
    2013 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (TAEECE), 2013, : 98 - 104
  • [30] An Improved Distributed Intrusion Detection Architecture for Cloud Computing
    Ghorbani, Hamid Reza
    Hashemi, Mahmoud Reza
    COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS, CNDS 2013, 2014, 428 : 105 - 116