Abstract

This paper reviews the background and related studies in the areas of cloud systems, intrusion detection and blockchain applications against cyber attacks. This work aims to discuss collaborative anomaly detection systems for discovering insider and outsider attacks from cloud centres, including the technologies of virtualisation and containerisation, along with trusting intrusion detection and cloud systems using blockchain. Moreover, the ability to detect such malicious attacks is critical for conducting necessary mitigation, at an early stage, to minimise the impact of disruption and restore cloud operations and their live migration processes. This paper presents an overview of cloud architecture and categorises potential state-of-the-art security events based on their occurrence at different cloud deployment models. Network Intrusion Detection Systems (NIDS) in the cloud, involving types of classification and common detection approaches, are also described. Collaborative NIDSs for cloud-based blockchain applications are also explained to demonstrate how blockchain can address challenges related to data privacy and trust management. A summary of the research challenges and future research directions in these fields is also explained.

Highlights

  • Cloud systems face sophisticated attack scenarios that has increased with the emergence of blockchain

  • A collaborative Intrusion Detection Systems (IDSs) (CIDS) would be a protection layer to detect insider and outsider attacks, which denotes the development of distributed intrusion detection engines across network nodes of cloud systems [11]

  • We present a comprehensive review of IDS and blockchain and how they could be used together to offer security and privacy perspectives in cloud systems

Read more

Summary

INTRODUCTION

Cloud systems face sophisticated attack scenarios that has increased with the emergence of blockchain. A collaborative IDS (CIDS) would be a protection layer to detect insider and outsider attacks, which denotes the development of distributed intrusion detection engines across network nodes of cloud systems [11]. It should be scalable and cost-effective to inspect various cloud nodes for discovering new cyber attacks. For intrusion detection, the authors reviewed IDSs and their attributes, including detection techniques, IDS deployment strategies, security threats, and validation strategies in IoT systems [17]. We present a comprehensive review of IDS and blockchain and how they could be used together to offer security and privacy perspectives in cloud systems.

CLOUD COMPUTING SYSTEMS
CONTAINERISATION FOR LIGHTWEIGHT VIRTUALISATION
CYBER SECURITY ATTACKS AND TAXONOMIES IN CLOUD COMPUTING
CLOUD COMPUTING SECURITY SOLUTIONS
Findings
CHALLENGES AND FUTURE DIRECTIONS OF IDS AND BLOCKCHAIN IN THE CLOUD
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call