Abstract

The cloud environment is used in all sectors that provide different services to the users. The assistance provided by the cloud environment in different sectors such as business, entertainment, government, education, IT industry, etc. The services rendered by both the public and private organizations considering scalable, on a payas-you-go basis, on-demand services, etc. Due to its dispersed nature and viability in all the sectors, makes the system inefficient which causes numerous attacks in the environment. These attacks affect the confidentiality, integrity, and availability of cloud resources. Some examples of attacks are Ransomware, man-in-the-middle attacks, Denial of service attacks, insider attacks, etc. Thus, Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) play a crucial role in the cloud environment by detecting and preventing the system from suspicious attacks. The objective of this paper is to provide information about attacks that affect the cloud environment. This paper also covers the different techniques of intrusion detection, intrusion prevention, and its hybrid approach.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.