Reference Hub7
A Review of Intrusion Detection Systems in Cloud Computing

A Review of Intrusion Detection Systems in Cloud Computing

Chiba Zouhair, Noreddine Abghour, Khalid Moussaid, Amina El Omri, Mohamed Rida
Copyright: © 2018 |Pages: 31
ISBN13: 9781522557364|ISBN10: 1522557369|EISBN13: 9781522557371
DOI: 10.4018/978-1-5225-5736-4.ch012
Cite Chapter Cite Chapter

MLA

Zouhair, Chiba, et al. "A Review of Intrusion Detection Systems in Cloud Computing." Security and Privacy in Smart Sensor Networks, edited by Yassine Maleh, et al., IGI Global, 2018, pp. 253-283. https://doi.org/10.4018/978-1-5225-5736-4.ch012

APA

Zouhair, C., Abghour, N., Moussaid, K., El Omri, A., & Rida, M. (2018). A Review of Intrusion Detection Systems in Cloud Computing. In Y. Maleh, A. Ezzati, & M. Belaissaoui (Eds.), Security and Privacy in Smart Sensor Networks (pp. 253-283). IGI Global. https://doi.org/10.4018/978-1-5225-5736-4.ch012

Chicago

Zouhair, Chiba, et al. "A Review of Intrusion Detection Systems in Cloud Computing." In Security and Privacy in Smart Sensor Networks, edited by Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, 253-283. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-5736-4.ch012

Export Reference

Mendeley
Favorite

Abstract

Security is a major challenge faced by cloud computing (CC) due to its open and distributed architecture. Hence, it is vulnerable and prone to intrusions that affect confidentiality, availability, and integrity of cloud resources and offered services. Intrusion detection system (IDS) has become the most commonly used component of computer system security and compliance practices that defends cloud environment from various kinds of threats and attacks. This chapter presents the cloud architecture, an overview of different intrusions in the cloud, the challenges and essential characteristics of cloud-based IDS (CIDS), and detection techniques used by CIDS and their types. Then, the authors analyze 24 pertinent CIDS with respect to their various types, positioning, detection time, and data source. The analysis also gives the strength of each system and limitations in order to evaluate whether they carry out the security requirements of CC environment or not.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.