A Survey on Intrusion Detection Systems for Fog and Cloud Computing

被引:25
|
作者
Chang, Victor [1 ]
Golightly, Lewis [1 ]
Modesti, Paolo [1 ]
Xu, Qianwen Ariel [1 ]
Doan, Le Minh Thao [1 ]
Hall, Karl [1 ]
Boddu, Sreeja [2 ]
机构
[1] Teesside Univ, Sch Comp Engn & Digital Technol, Cybersecur Informat Syst & AI Res Grp, Middlesbrough TS1 3BX, Cleveland, England
[2] Poznan Univ Tech, Inst Comp Sci, PL-60965 Poznan, Poland
来源
FUTURE INTERNET | 2022年 / 14卷 / 03期
关键词
cloud computing; intrusion detection and prevention; security; recommendations for cloud computing and security; recommendations for network security; defense techniques; SECURITY; SERVICE; ARCHITECTURE;
D O I
10.3390/fi14030089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hence, there is an absolute need to differentiate boundaries in personal information and cloud and fog computing globally and the adoption of specific information security policies and regulations. The goal of the security policy and framework for cloud and fog computing is to protect the end-users and their information, reduce task-based operations, aid in compliance, and create standards for expected user actions, all of which are based on the use of established rules for cloud computing. Moreover, intrusion detection systems are widely adopted solutions to monitor and analyze network traffic and detect anomalies that can help identify ongoing adversarial activities, trigger alerts, and automatically block traffic from hostile sources. This survey paper analyzes factors, including the application of technologies and techniques, which can enable the deployment of security policy on fog and cloud computing successfully. The paper focuses on a Software-as-a-Service (SaaS) and intrusion detection, which provides an effective and resilient system structure for users and organizations. Our survey aims to provide a framework for a cloud and fog computing security policy, while addressing the required security tools, policies, and services, particularly for cloud and fog environments for organizational adoption. While developing the essential linkage between requirements, legal aspects, analyzing techniques and systems to reduce intrusion detection, we recommend the strategies for cloud and fog computing security policies. The paper develops structured guidelines for ways in which organizations can adopt and audit the security of their systems as security is an essential component of their systems and presents an agile current state-of-the-art review of intrusion detection systems and their principles. Functionalities and techniques for developing these defense mechanisms are considered, along with concrete products utilized in operational systems. Finally, we discuss evaluation criteria and open-ended challenges in this area.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] Toward Secure and Trustworthy Vehicular Fog Computing: A Survey
    Nazih, Ossama
    Benamar, Nabil
    Lamaazi, Hanane
    Choaui, Habiba
    IEEE ACCESS, 2024, 12 : 35154 - 35171
  • [32] A Survey on the Impact of DDoS Attacks in Cloud Computing: Prevention, Detection and Mitigation Techniques
    Srinivasan, Karthik
    Mubarakali, Azath
    Alqahtani, Abdulrahman Saad
    Kumar, A. Dinesh
    INTELLIGENT COMMUNICATION TECHNOLOGIES AND VIRTUAL MOBILE NETWORKS, ICICV 2019, 2020, 33 : 252 - 270
  • [33] Vehicular Cloud Computing Security: A Survey
    Goumidi, Hadjer
    Aliouat, Zibouda
    Harous, Saad
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 2473 - 2499
  • [34] Authentication in mobile cloud computing: A survey
    Alizadeh, Mojtaba
    Abolfazli, Saeid
    Zamani, Mazdak
    Baharun, Sabariah
    Sakurai, Kouichi
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 : 59 - 80
  • [35] A Circular Chain Intrusion Detection for Cloud Computing based on improved AdjointVM Approach
    Oktay, Ucman
    Aydin, Muhammed Ali
    Sahingoz, Ozgur Koray
    14TH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2013, : 201 - 206
  • [36] Fog Computing for the Internet of Things: A Survey
    Puliafito, Carlo
    Mingozzi, Enzo
    Longo, Francesco
    Puliafito, Antonio
    Rana, Omer
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (02)
  • [37] Integrated Fog and Cloud Computing Issues and Challenges
    Sharma, Shivom
    Sajid, Mohammad
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2021, 11 (04) : 174 - 193
  • [38] Orchestration in Fog Computing: A Comprehensive Survey
    Costa, Breno
    Bachiega Jr, Joao
    de Carvalho, Leonardo Reboucas
    Araujo, Aleteia P. F.
    ACM COMPUTING SURVEYS, 2023, 55 (02)
  • [39] A survey on fog computing for the Internet of Things
    Bellavista, Paolo
    Berrocal, Javier
    Corradi, Antonio
    Das, Sajal K.
    Foschini, Luca
    Zanni, Alessandro
    PERVASIVE AND MOBILE COMPUTING, 2019, 52 : 71 - 99
  • [40] A survey of intrusion detection techniques in Cloud
    Modi, Chirag
    Patel, Dhiren
    Borisaniya, Bhavesh
    Patel, Hiren
    Patel, Avi
    Rajarajan, Muttukrishnan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 42 - 57