Abstract
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.
Highlights
Cloud computing is Internet based infrastructure where shared resources, software and information are provided to computers and other devices on-demand
Intrusion Detection Systems (IDSs) can identify suspicious activities by monitoring network traffic changes, configuration of the system, logs files, and actions of end-users. When such a suspicious event is detected, IDS sends an alert message to a person or monitoring console to trigger some actions for preventing these attacks
In addition to identifying cloud security issues and classifying them into several categories, we have identified dependencies among these categories and the security issues they encompass
Summary
Cloud computing is Internet based infrastructure where shared resources, software and information are provided to computers and other devices on-demand. The National Institute of Standards and Technology (NIST) defined five characteristics of cloud computing [1]: on-demand self-service, rapid elasticity or expansion, broad network access, resource pooling, and measured service. It defined three “service models” (software, platform and infrastructure), and four “deployment models” (private, community, public and hybrid) that together categorize ways to deliver cloud services. We classify security problems and attacks of cloud computing environments such as Flooding Attack, Denial of Service (DoS) attacks, Side Channel Attacks, phishing, malware Cloud Injection Attacks To prevent these attackers, Intrusion Detection Systems (IDSs) are effective solutions to resist them. The last section summarizes the main contribution of this work and details our perspectives
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Interactive Multimedia and Artificial Intelligence
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.