Cloud Computing and the Common Man
Computer
Distributed Intrusion Detection in Clouds Using Mobile Agents
ADVCOMP '09 Proceedings of the 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Google Android: A Comprehensive Security Assessment
IEEE Security and Privacy
Intrusion Detection for Grid and Cloud Computing
IT Professional
Ontological approach toward cybersecurity in cloud computing
Proceedings of the 3rd international conference on Security of information and networks
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems
COMPSACW '10 Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops
Understanding Cloud Computing Vulnerabilities
IEEE Security and Privacy
Intrusion detection system in cloud computing environment
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Virtual machine monitor-based lightweight intrusion detection
ACM SIGOPS Operating Systems Review
Alert correlation in collaborative intelligent intrusion detection systems-A survey
Applied Soft Computing
Cloud-based malware detection for evolving data streams
ACM Transactions on Management Information Systems (TMIS)
Anomaly-based intrusion detection in software as a service
DSNW '11 Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops
Intrusion Detection Techniques for Infrastructure as a Service Cloud
DASC '11 Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing
CIDS: A Framework for Intrusion Detection in Cloud Systems
ITNG '12 Proceedings of the 2012 Ninth International Conference on Information Technology - New Generations
A novel intrusion severity analysis approach for Clouds
Future Generation Computer Systems
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders. The traditional Intrusion Detection and Prevention Systems (IDPS) are deemed largely inefficient to be deployed in cloud computing environments due to their openness, dynamicity and virtualization in offered services. This paper surveys and explores the possible solutions to detect and prevent intrusions in cloud computing systems by providing a comprehensive taxonomy of existing IDPS. It discusses the key features of IDPS that are challenging and crucial for choosing the right security measures for designing an IDPS. The paper further reviews the current state of the art of developed IDPSs for cloud computing which uses advanced techniques in overcoming the challenges imposed by cloud computing requirements for more resilient, effective and efficient IDPSs, abbreviated as CIPDS.