A review on intrusion detection techniques for cloud computing and security challenges

@article{Kene2015ARO,
  title={A review on intrusion detection techniques for cloud computing and security challenges},
  author={Snehal G. Kene and Deepti P. Theng},
  journal={2015 2nd International Conference on Electronics and Communication Systems (ICECS)},
  year={2015},
  pages={227-232}
}
Nowadays, Cloud Computing is the first choice of every IT organization because of its scalable and flexible nature. However, the security and privacy is a major concern in its success because of its open and distributed architecture that is open for intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect various attacks on cloud. This paper shares an overview of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection… CONTINUE READING

From This Paper

Figures, tables, results, connections, and topics extracted from this paper.
7 Extracted Citations
27 Extracted References
Similar Papers

Referenced Papers

Publications referenced by this paper.
Showing 1-10 of 27 references

M

  • C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel
  • Rajarajan,“A Survey of Intrusion Detection…
  • 2013
Highly Influential
9 Excerpts

J

  • A. Patel, M. Taghavi, K. Bakhtiyari
  • C. Ju ́nior, “An Intrusion Detection and…
  • 2013
Highly Influential
3 Excerpts

Efficient Heterogeneous Computational Strategy for Cross-Cloud Computing Environment," Emerging Research in Computing, Information

  • D. Theng
  • Communication and Applications (ERCICA),
  • 2014

Preserving Privacy and Illegal Content Distribution for Cloud Environment,

  • M. H. Gourkhede, D. P. Theng
  • International Journal of Computing and Technology…
  • 2014

Similar Papers

Loading similar papers…