Analysis of Cloud-Based Intrusion Detection System

  • Conference paper
  • First Online:
Information and Communication Technology for Competitive Strategies (ICTCS 2020)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 191))

  • 1097 Accesses

Abstract

Information technology companies start deploying cloud computing as their backbone of business throughout the world day by day. Because cloud computing offers flexible, user-friendly, and pay-peruse services to the companies. In order to be successful in the platform, the companies have to face privacy and security issues of the cloud network’s nature. Because the cloud network is open and well-connected architecture, it is unsafe to the user’s data. Intrusion detection system is very helpful in detecting intruders on the cloud network. This paper furnishes an introduction of possible intrusive activities on the cloud network. Also, this paper analyzes some of the cloud-based intrusion detection systems. The analysis is marked with respect to the parameters such as type of systems, the technique used by the intrusion detection system, merits and demerits of the techniques. This analysis also helps to conclude which of the techniques can be employable in the cloud network by pointing the limitations of each method. For eliminating security challenges of the cloud system, the intrusion detection system should use multiple detection methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 160.49
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 213.99
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sobin Soniya, S., Maria Celestin Vigila, S.: Intrusion detection system classification and techniques. In: IEEE International Conference on Circuit, Power and Computing Technologies, pp. 147–152 (2016)

    Google Scholar 

  2. Milani, B.A., Navimipour, N.J.: A comprehensive review of the data replication techniques in the cloud environments: major trends and future directions. J. Netw. Comput. Appl. 64, 229–238 (2016)

    Article  Google Scholar 

  3. Sucahyo, G., Rotinsulu, Y.: Software as a service quality factors evaluation using analytic hierarchy process. Int. J. Bus. Inf. Syst. 24(1), 51–68 (2017)

    Google Scholar 

  4. Tao, C., Gao, J.: On building a cloud-based mobile testing infrastructure service system. J. Syst. Softw. 124, 39–55 (2017)

    Article  Google Scholar 

  5. Bassiliades, N., Symeonidis, M.: A semantic recommendation algorithm for the PaaSport platform-as-a-service marketplace. Expert Syst. Appl. 67, 203–227 (2017)

    Article  Google Scholar 

  6. Navimipour, N.J., Rahmani, A.M., Navin, A.H., Hosseinzadeh, M.: Expert cloud: a cloud-based framework to share the knowledge and skills of human resources. Comput. Hum. Behav. 46, 57–74 (2015)

    Article  Google Scholar 

  7. Patil, R., Dudeja, H., Modi, C.: Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. Comput. Secur. 85, 402–422 (2019)

    Article  Google Scholar 

  8. Diaz-Verdejo, J., Garcia-Teodora, P., Macia-Fernandez, G.: Anomaly based network intrusion detection: techniques, system and challenges. Comput. Secur. 28, 18–28 (2009)

    Article  Google Scholar 

  9. Lee, J.H., Park, M.W., Eom, J.H., Chung, T.M.: Multi-level intrusion detection system and log management in cloud computing. ICACT 552–555

    Google Scholar 

  10. Aldribi, A., Traoré, I., Moa, B., Nwamuo, O.: Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking. Comput. Secur. 88, 101646 (2020)

    Article  Google Scholar 

  11. Modi, C.N., Patel, D.R., Patel, A., Muttukrishnan, R.: Bayesian classifier and snort based network intrusion detection system in cloud computing. In: Third International Conference on Computing, Communication and Networking Technologies (2012)

    Google Scholar 

  12. Wang, W., Du, X., Shan, D., Qin, R., Wang, N.: Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine. IEEE Trans. Cloud Comput. (2020)

    Google Scholar 

  13. Hajimirzaei, B., Navimipour, N.J.: Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Exp. 5(1), 56–59 (2019)

    Article  Google Scholar 

  14. Abusitta, A., Bellaiche, M., Dagenais, M.: A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Futur. Gener. Comput. Syst. 98, 308–318 (2019)

    Article  Google Scholar 

  15. Wang, W., Ren, L., Chen, L., Ding, Y.: Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf. Sci. 501, 543–557 (2019)

    Article  Google Scholar 

  16. Balamurugan, V., Saravanan, R.: Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Clust. Comput. 22(6), 13027–13039 (2019)

    Article  Google Scholar 

  17. Achbarou, O., El Kiram, M.A., Bourkoukou, O., Elbouanani, S.: A new distributed intrusion detection system based on multi-agent system for cloud environment. Int. J. Commun. Netw. Inf. Secur. 10(3), 526 (2018)

    Google Scholar 

  18. Sobin Soniya, S., Celestin Vigila, M.: Improving the efficiency of classifiers for detecting intrusion using rough set theory. J. Adv. Softw. Eng. Test. 1(1), 1–14

    Google Scholar 

  19. Ajay Guleia, A., Raj, K., Devi, S.: Decision tree based algorithm for intrusion detection. Int. J. Adv. Netw. Appl. 7(04), 2828–28344 (2016)

    Google Scholar 

  20. Brammya, G., Ninu Preetha, N.S., Ramya, R., Rajakumar, B.R. Binu, D.: Deer hunting optimization algorithm: a new nature-inspired meta-heuristic paradigm. Comput. J. (2019)

    Google Scholar 

  21. Li, Q., He, Z.C., Li, E.: The feedback artificial tree (FAT) algorithm. Soft Comput. 1–28 (2020)

    Google Scholar 

  22. Aggarwala, P., Sharmab, S.K.: Analysis of KDD dataset attributes—class wise for intrusion detection. Procedia Comput. Sci. 57, 842–851 (2015)

    Google Scholar 

  23. The BoT-IoT Dataset. https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/bot_iot.php. Accessed on Oct 2020

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sobin Soniya, S., Maria Celestin Vigila, S. (2022). Analysis of Cloud-Based Intrusion Detection System. In: Joshi, A., Mahmud, M., Ragel, R.G., Thakur, N.V. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2020). Lecture Notes in Networks and Systems, vol 191. Springer, Singapore. https://doi.org/10.1007/978-981-16-0739-4_104

Download citation

Publish with us

Policies and ethics

Navigation