CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Intrusion Detection and Prevention in Cloud Environment: A Systematic Review

by Iti Raghav, Shashi Chhikara, Nitasha Hasteer
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 24
Year of Publication: 2013
Authors: Iti Raghav, Shashi Chhikara, Nitasha Hasteer
10.5120/11725-7304

Iti Raghav, Shashi Chhikara, Nitasha Hasteer . Intrusion Detection and Prevention in Cloud Environment: A Systematic Review. International Journal of Computer Applications. 68, 24 ( April 2013), 7-11. DOI=10.5120/11725-7304

@article{ 10.5120/11725-7304,
author = { Iti Raghav, Shashi Chhikara, Nitasha Hasteer },
title = { Intrusion Detection and Prevention in Cloud Environment: A Systematic Review },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 24 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number24/11725-7304/ },
doi = { 10.5120/11725-7304 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:28:45.845960+05:30
%A Iti Raghav
%A Shashi Chhikara
%A Nitasha Hasteer
%T Intrusion Detection and Prevention in Cloud Environment: A Systematic Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 24
%P 7-11
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The traditional intrusion detection system is not flexible in providing security in cloud computing because of the distributed structure of cloud computing. This paper surveys the intrusion detection and prevention techniques and possible solutions in Host Based and Network Based Intrusion Detection System. It discusses DDoS attacks in Cloud environment. Different Intrusion Detection techniques are also discussed namely anomaly based techniques and signature based techniques. It also surveys different approaches of Intrusion Prevention System.

References
  1. Hisham A. Kholidy, Fabrizio Baiardi, Salim Hariri, Esraa M. Elhariri, Ahmed M. Yousof and Sahar A. Shehata. 2012. A Hierarchical Intrusion Detection System For Ckoud: Design and Evaluation. International Journal on Cloud Computing Services and Architecture (IJCSA).
  2. Frank Doelitzscher, Christoph Reich, Martin Knahl, Alexander Passfal and Nathan Clarke. 2012. An agent based business aware incident detection system for cloud environments. Journal of Cloud Computing: Advances, Systems and Applications
  3. Irfan Gul, M. Hussain. 2011. Distributed Cloud Intrusion Detection Model. International Journal of Advanced Science and Technology.
  4. Peter Mell, Timothy Grance. 2011. The NIST Definition of Cloud Computing (Draft). NIST. . http://www. productionscale. com/home/2011/8/7/the-nist-definition-of-cloud-computingdraft. html#axz z1X0xKZRuf/
  5. Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Junior. 2013. An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications.
  6. S. V. Narwane, S. L. Vaikol. 2012. Intrusion Detection System in Cloud Computing Environment. InInternational Conference on Advances in Communication and Computing Technologies (ICACACT).
  7. Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande. 2012. Intrusion Detection System for Cloud Computing. International Journal of Scientific & Technology Research Volume 1.
  8. Hassen Mohammed Alsafi, Wafaa Mustafa Abduallah and Al-Sakib khan Pathan. 2012. IPS: An Integrated Intrusion Handling Model for Cloud Computing Environment, International Journal of Computing and Information Technology (IJCIT)
  9. Deris Stiawan, Abdul Hanan Abdullah, Mohd. Yazid Idris. 2011. Characterizing Network Intrusion Prevention System. International Journal of Computer Applicationas.
  10. V. Jyothsna, V. V. Rama Prasad, K. Munivara Prasad, 2011, A Review of Anomaly Based Intrusion Detection System, International Journal of Computer Applications.
  11. R. Base and P. Mell. 2001. NIST Special Publication on Intrusion Detection Systems. National Institute of Standard and Technology.
  12. Dinesh Sequeira. 2002. Intrusion Prevention Systems-Scurity Silver Bullet?. SANS Institute.
  13. Deris Stiawan, Ala Yaseen Ibrahim Shakhatreh, Mohd. Yazid Idris, Kamarulnizam Abu Bakar, Abdul Hanan Abdullah. 2012. Intrusion Prevention System: A Survey. Journal of Theoretical and Applied Information Technology.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Intrusion Detection System Attacks DDoS NIDS HIDS