Intrusion Detection Techniques Analysis in Cloud Computing

被引:0
作者
Qi, Wuqi [1 ]
Wu, Wei [1 ]
Wang, Hao [1 ]
Ou, Lu [1 ]
Hu, Ning [1 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
来源
2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET | 2023年
基金
中国国家自然科学基金;
关键词
Cloud computing; Cloud Security; Intrusion Detection; Artificial Intelligence; Dataset;
D O I
10.1109/CloudNet59005.2023.10490069
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth and widespread usage of cloud computing have brought security concerns to the forefront. To tackle these concerns, extensive research and development efforts have been dedicated to intrusion detection techniques. This paper provides an investigation and analysis of the current state of intrusion detection techniques in cloud computing. It encompasses the classification of existing techniques and an examination of the security requirements specific to cloud computing. We systematically summarize the novel approaches to intrusion detection techniques in cloud computing and explore how artificial intelligence techniques can enhance intrusion detection. In terms of evaluating these techniques, we conduct a comparative analysis of the merits and limitations of available datasets. Lastly, we elucidate the challenges inherent to intrusion detection in the cloud and outline future research directions.
引用
收藏
页码:360 / 363
页数:4
相关论文
共 21 条
  • [1] Anderson James P., 1980, Computer Security Threat Monitoring and Surveillance
  • [2] A Comparative Analysis of Different Intrusion Detection Techniques in Cloud Computing
    Bakshi, Aditya
    Sunanda
    [J]. ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 358 - 378
  • [3] Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN)
    Balamurugan, E.
    Mehbodniya, Abolfazl
    Kariri, Elham
    Yadav, Kusum
    Kumar, Anil
    Haq, Mohd Anul
    [J]. PATTERN RECOGNITION LETTERS, 2022, 156 : 142 - 151
  • [4] Besharati E., LR-HIDS: logistic regression host-based intrusion detection system for cloud environments
  • [5] C. S. Alliance, 2022, White Paper
  • [6] FCM-SVM based intrusion detection system for cloud computing environment
    Jaber, Aws Naser
    Ul Rehman, Shafiq
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 3221 - 3231
  • [7] Krishnaveni S., Network intrusion detection based on ensemble classification and feature selection method for cloud computing, V34
  • [8] Liu M, 2022, Arxiv, DOI arXiv:2109.11821
  • [9] A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber Physical Systems
    Liu, Yuan
    Yu, Wangyuan
    Ai, Zhengpeng
    Xu, Guangxia
    Zhao, Liang
    Tian, Zhihong
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2685 - 2696
  • [10] Deep Generative Learning Models for Cloud Intrusion Detection Systems
    Ly Vu
    Quang Uy Nguyen
    Nguyen, N. Diep
    Dinh Thai Hoang
    Dutkiewicz, Eryk
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (01) : 565 - 577