Abstract
Information technology companies start deploying cloud computing as their backbone of business throughout the world day by day. Because cloud computing offers flexible, user-friendly, and pay-peruse services to the companies. In order to be successful in the platform, the companies have to face privacy and security issues of the cloud network’s nature. Because the cloud network is open and well-connected architecture, it is unsafe to the user’s data. Intrusion detection system is very helpful in detecting intruders on the cloud network. This paper furnishes an introduction of possible intrusive activities on the cloud network. Also, this paper analyzes some of the cloud-based intrusion detection systems. The analysis is marked with respect to the parameters such as type of systems, the technique used by the intrusion detection system, merits and demerits of the techniques. This analysis also helps to conclude which of the techniques can be employable in the cloud network by pointing the limitations of each method. For eliminating security challenges of the cloud system, the intrusion detection system should use multiple detection methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sobin Soniya, S., Maria Celestin Vigila, S.: Intrusion detection system classification and techniques. In: IEEE International Conference on Circuit, Power and Computing Technologies, pp. 147–152 (2016)
Milani, B.A., Navimipour, N.J.: A comprehensive review of the data replication techniques in the cloud environments: major trends and future directions. J. Netw. Comput. Appl. 64, 229–238 (2016)
Sucahyo, G., Rotinsulu, Y.: Software as a service quality factors evaluation using analytic hierarchy process. Int. J. Bus. Inf. Syst. 24(1), 51–68 (2017)
Tao, C., Gao, J.: On building a cloud-based mobile testing infrastructure service system. J. Syst. Softw. 124, 39–55 (2017)
Bassiliades, N., Symeonidis, M.: A semantic recommendation algorithm for the PaaSport platform-as-a-service marketplace. Expert Syst. Appl. 67, 203–227 (2017)
Navimipour, N.J., Rahmani, A.M., Navin, A.H., Hosseinzadeh, M.: Expert cloud: a cloud-based framework to share the knowledge and skills of human resources. Comput. Hum. Behav. 46, 57–74 (2015)
Patil, R., Dudeja, H., Modi, C.: Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. Comput. Secur. 85, 402–422 (2019)
Diaz-Verdejo, J., Garcia-Teodora, P., Macia-Fernandez, G.: Anomaly based network intrusion detection: techniques, system and challenges. Comput. Secur. 28, 18–28 (2009)
Lee, J.H., Park, M.W., Eom, J.H., Chung, T.M.: Multi-level intrusion detection system and log management in cloud computing. ICACT 552–555
Aldribi, A., Traoré, I., Moa, B., Nwamuo, O.: Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking. Comput. Secur. 88, 101646 (2020)
Modi, C.N., Patel, D.R., Patel, A., Muttukrishnan, R.: Bayesian classifier and snort based network intrusion detection system in cloud computing. In: Third International Conference on Computing, Communication and Networking Technologies (2012)
Wang, W., Du, X., Shan, D., Qin, R., Wang, N.: Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine. IEEE Trans. Cloud Comput. (2020)
Hajimirzaei, B., Navimipour, N.J.: Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Exp. 5(1), 56–59 (2019)
Abusitta, A., Bellaiche, M., Dagenais, M.: A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Futur. Gener. Comput. Syst. 98, 308–318 (2019)
Wang, W., Ren, L., Chen, L., Ding, Y.: Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm. Inf. Sci. 501, 543–557 (2019)
Balamurugan, V., Saravanan, R.: Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Clust. Comput. 22(6), 13027–13039 (2019)
Achbarou, O., El Kiram, M.A., Bourkoukou, O., Elbouanani, S.: A new distributed intrusion detection system based on multi-agent system for cloud environment. Int. J. Commun. Netw. Inf. Secur. 10(3), 526 (2018)
Sobin Soniya, S., Celestin Vigila, M.: Improving the efficiency of classifiers for detecting intrusion using rough set theory. J. Adv. Softw. Eng. Test. 1(1), 1–14
Ajay Guleia, A., Raj, K., Devi, S.: Decision tree based algorithm for intrusion detection. Int. J. Adv. Netw. Appl. 7(04), 2828–28344 (2016)
Brammya, G., Ninu Preetha, N.S., Ramya, R., Rajakumar, B.R. Binu, D.: Deer hunting optimization algorithm: a new nature-inspired meta-heuristic paradigm. Comput. J. (2019)
Li, Q., He, Z.C., Li, E.: The feedback artificial tree (FAT) algorithm. Soft Comput. 1–28 (2020)
Aggarwala, P., Sharmab, S.K.: Analysis of KDD dataset attributes—class wise for intrusion detection. Procedia Comput. Sci. 57, 842–851 (2015)
The BoT-IoT Dataset. https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/bot_iot.php. Accessed on Oct 2020
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sobin Soniya, S., Maria Celestin Vigila, S. (2022). Analysis of Cloud-Based Intrusion Detection System. In: Joshi, A., Mahmud, M., Ragel, R.G., Thakur, N.V. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2020). Lecture Notes in Networks and Systems, vol 191. Springer, Singapore. https://doi.org/10.1007/978-981-16-0739-4_104
Download citation
DOI: https://doi.org/10.1007/978-981-16-0739-4_104
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0738-7
Online ISBN: 978-981-16-0739-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)