Intrusion Detection System and It’s Cloud Environment Aspects: A State of Art

  • Priyanka Joshi, Praneet Saurabh, Dhananjay Bisen, Lalit Kane

Abstract

Nowadays, cloud computing is the first choice of every IT organization because of its scalable and flexible nature. However, the security and privacy is a major concern in its success because of  its open and dynamic nature that is open for intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect various attacks on cloud. This dynamic nature also introduces security vulnerabilities as availability, integirity of data is paramount. Hackers and intruders are making successful attempts to intrude and crash the network and by trying to have unauthorized intrusion.In this context, Intrusion detection system (IDS) focuses on the protection of resources from attacks. IDS analyses and make predictions regarding user behavior or any packet whether it is an attack or a normal behavior. But,this analysis of users behavior may implicitly include some demerits regarding the security of data that is stored in cloud space. This paper introduces the relevant taxonomies, classifification methods and then critically analyses the available literature to identify the challenges. This paper also presents an analysis of differet collaborating techniques like Rought set theory (RST) and Support vector machine (SVM) in this context and then a comprehensive survey summerises the outcome.

Published
2019-12-05
Section
Articles