A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

被引:50
作者
Alkadi, Osama [1 ]
Moustafa, Nour [1 ]
Turnbull, Benjamin [1 ]
机构
[1] Univ New South Wales, Sch Engn & Informat Technol, ADFA, Canberra, ACT 2612, Australia
关键词
Intrusion detection systems; collaborative anomaly detection; cloud systems; blockchain applications; approaches; challenges; solutions; DEEP LEARNING APPROACH; ANOMALY DETECTION; DETECTION SYSTEM; SECURITY ISSUES; NETWORK; INTERNET; BITCOIN; DOCKER; LOCALIZATION; TECHNOLOGIES;
D O I
10.1109/ACCESS.2020.2999715
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper reviews the background and related studies in the areas of cloud systems, intrusion detection and blockchain applications against cyber attacks. This work aims to discuss collaborative anomaly detection systems for discovering insider and outsider attacks from cloud centres, including the technologies of virtualisation and containerisation, along with trusting intrusion detection and cloud systems using blockchain. Moreover, the ability to detect such malicious attacks is critical for conducting necessary mitigation, at an early stage, to minimise the impact of disruption and restore cloud operations and their live migration processes. This paper presents an overview of cloud architecture and categorises potential state-of-the-art security events based on their occurrence at different cloud deployment models. Network Intrusion Detection Systems (NIDS) in the cloud, involving types of classification and common detection approaches, are also described. Collaborative NIDSs for cloud-based blockchain applications are also explained to demonstrate how blockchain can address challenges related to data privacy and trust management. A summary of the research challenges and future research directions in these fields is also explained.
引用
收藏
页码:104893 / 104917
页数:25
相关论文
共 163 条
[1]   Malware Detection in Cloud Infrastructures using Convolutional Neural Networks [J].
Abdelsalam, Mahmoud ;
Krishnan, Ram ;
Huang, Yufei ;
Sandhu, Ravi .
PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, :162-169
[2]   A deep learning approach for proactive multi-cloud cooperative intrusion detection system [J].
Abusitta, Adel ;
Bellaiche, Martine ;
Dagenais, Michel ;
Halabi, Talal .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 98 :308-318
[3]  
Alexopoulos Nikolaos, 2017, 12 INT C CRITIS 2018, DOI [10.1007/978- 3- 319-99843-5 _10, DOI 10.1007/978-3-319-99843-5_10]
[4]  
Alharkan T., 2012, Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012), P686, DOI 10.1109/CCGrid.2012.81
[5]   Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers [J].
Alkadi, Osama ;
Moustafa, Nour ;
Turnbull, Benjamin ;
Choo, Kim-Kwang Raymond .
IEEE ACCESS, 2019, 7 :114607-114618
[6]   An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems [J].
Alkadi, Osama S. ;
Moustafa, Nour ;
Turnbull, Benjamin ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1164-1174
[7]  
[Anonymous], 2018, New Open-Sourced Innovation Aims to Reduce the Risk of 51% Attacks
[8]  
[Anonymous], TREACH 12 CLOUD COMP
[9]  
[Anonymous], WHITE PAPER VIRTUALI
[10]  
[Anonymous], 2017, INT C MOBILE NETW MA