Abstract

Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

Highlights

  • Cloud computing is Internet based infrastructure where shared resources, software and information are provided to computers and other devices on-demand

  • Intrusion Detection Systems (IDSs) can identify suspicious activities by monitoring network traffic changes, configuration of the system, logs files, and actions of end-users. When such a suspicious event is detected, IDS sends an alert message to a person or monitoring console to trigger some actions for preventing these attacks

  • In addition to identifying cloud security issues and classifying them into several categories, we have identified dependencies among these categories and the security issues they encompass

Read more

Summary

Introduction

Cloud computing is Internet based infrastructure where shared resources, software and information are provided to computers and other devices on-demand. The National Institute of Standards and Technology (NIST) defined five characteristics of cloud computing [1]: on-demand self-service, rapid elasticity or expansion, broad network access, resource pooling, and measured service. It defined three “service models” (software, platform and infrastructure), and four “deployment models” (private, community, public and hybrid) that together categorize ways to deliver cloud services. We classify security problems and attacks of cloud computing environments such as Flooding Attack, Denial of Service (DoS) attacks, Side Channel Attacks, phishing, malware Cloud Injection Attacks To prevent these attackers, Intrusion Detection Systems (IDSs) are effective solutions to resist them. The last section summarizes the main contribution of this work and details our perspectives

Categories of Cloud Security
Attacks Related to the Cloud Security Categories
Denial of Service Attacks
Port Scanning
Malware Injection Attacks
Side Channel Attacks
Phishing Attacks
Man-In-The-Middle Cryptographic Attacks
Intrusion Detection System
Host-based Intrusion Detection Systems
Network based Intrusion Detection Systems
Proposed Work
Advantages of proposed model
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.