A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

被引:47
|
作者
Alkadi, Osama [1 ]
Moustafa, Nour [1 ]
Turnbull, Benjamin [1 ]
机构
[1] Univ New South Wales, Sch Engn & Informat Technol, ADFA, Canberra, ACT 2612, Australia
关键词
Intrusion detection systems; collaborative anomaly detection; cloud systems; blockchain applications; approaches; challenges; solutions; DEEP LEARNING APPROACH; ANOMALY DETECTION; DETECTION SYSTEM; SECURITY ISSUES; NETWORK; INTERNET; BITCOIN; DOCKER; LOCALIZATION; TECHNOLOGIES;
D O I
10.1109/ACCESS.2020.2999715
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper reviews the background and related studies in the areas of cloud systems, intrusion detection and blockchain applications against cyber attacks. This work aims to discuss collaborative anomaly detection systems for discovering insider and outsider attacks from cloud centres, including the technologies of virtualisation and containerisation, along with trusting intrusion detection and cloud systems using blockchain. Moreover, the ability to detect such malicious attacks is critical for conducting necessary mitigation, at an early stage, to minimise the impact of disruption and restore cloud operations and their live migration processes. This paper presents an overview of cloud architecture and categorises potential state-of-the-art security events based on their occurrence at different cloud deployment models. Network Intrusion Detection Systems (NIDS) in the cloud, involving types of classification and common detection approaches, are also described. Collaborative NIDSs for cloud-based blockchain applications are also explained to demonstrate how blockchain can address challenges related to data privacy and trust management. A summary of the research challenges and future research directions in these fields is also explained.
引用
收藏
页码:104893 / 104917
页数:25
相关论文
共 50 条
  • [11] Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions
    Riaz, Amna
    Ahmad, Hafiz Farooq
    Kiani, Adnan Khaild
    Qadir, Junaid
    Rasool, Raihan Ur
    Younis, Usman
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 611 - 634
  • [12] IoT security: Review, blockchain solutions, and open challenges
    Khan, Minhaj Ahmad
    Salah, Khaled
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 395 - 411
  • [13] Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges
    Zou, Jinglin
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Wang, Huaqun
    Choo, Kkwang Raymond
    ACM COMPUTING SURVEYS, 2021, 54 (08)
  • [14] Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing
    Habib, Gousia
    Sharma, Sparsh
    Ibrahim, Sara
    Ahmad, Imtiaz
    Qureshi, Shaima
    Ishfaq, Malik
    FUTURE INTERNET, 2022, 14 (11):
  • [15] An intrusion detection and prevention system in cloud computing: A systematic review
    Patel, Ahmed
    Taghavi, Mona
    Bakhtiyari, Kaveh
    Celestino Junior, Joaquim
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 25 - 41
  • [16] When Intrusion Detection Meets Blockchain Technology: A Review
    Meng, Weizhi
    Tischhauser, Elmar Wolfgang
    Wang, Qingju
    Wang, Yu
    Han, Jinguang
    IEEE ACCESS, 2018, 6 : 10179 - 10188
  • [17] Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions
    Park, Jin Ho
    Park, Jong Hyuk
    SYMMETRY-BASEL, 2017, 9 (08):
  • [18] A survey on database intrusion detection: approaches, challenges and application
    Jindal, Rajni
    Singh, Indu
    INTERNATIONAL JOURNAL OF INTELLIGENT ENGINEERING INFORMATICS, 2019, 7 (06) : 559 - 592
  • [19] Intrusion detection techniques in cloud environment: A survey
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 18 - 47
  • [20] A review of recent approaches on wrapper feature selection for intrusion detection
    Maldonado, Javier
    Cristina Riff, Maria
    Neveu, Bertrand
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 198