Intrusion detection techniques in cloud environment: A survey

@article{Mishra2017IntrusionDT,
  title={Intrusion detection techniques in cloud environment: A survey},
  author={Preeti Mishra and Emmanuel S. Pilli and Vijay Varadharajan and Udaya Kiran Tupakula},
  journal={J. Network and Computer Applications},
  year={2017},
  volume={77},
  pages={18-47}
}
Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have provided a survey on several intrusion detection techniques for detecting intrusions in the cloud computing environment. Most of them provide a discussion over traditional misuse and anomaly detection techniques. Virtual Machine Introspection (VMI) techniques are very helpful in detecting various stealth attacks targeting user-level and kernel-level processes running in virtual machines (VMs) by… CONTINUE READING
BETA

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 29 CITATIONS

A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation

  • 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)
  • 2018
VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A Cooperative Deep Belief Network for Intrusion Detection

  • 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

Cloud aid - A cloud computing tool for mitigating side-channel attacks

  • NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium
  • 2018
VIEW 2 EXCERPTS
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 115 REFERENCES

A survey on securing the virtual cloud

S. Taylor
  • J. Cloud Comput.: Adv
  • 2013
VIEW 24 EXCERPTS
HIGHLY INFLUENTIAL

HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems

  • 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks
  • 2013
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System

  • 2011 Eighth International Conference on Information Technology: New Generations
  • 2011
VIEW 14 EXCERPTS
HIGHLY INFLUENTIAL

Unobservable intrusion detection based on call traces in paravirtualized systems

  • Proceedings of the International Conference on Security and Cryptography
  • 2011
VIEW 12 EXCERPTS
HIGHLY INFLUENTIAL

Secure in-VM monitoring using hardware virtualization

  • ACM Conference on Computer and Communications Security
  • 2009
VIEW 26 EXCERPTS
HIGHLY INFLUENTIAL

Ether: malware analysis via hardware virtualization extensions

  • ACM Conference on Computer and Communications Security
  • 2008
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL