Comparison of Intrusion Detection Techniques in Cloud Computing

Authors(2) :-Aditya Bakshi, Sunanda

This paper has focused on specifying different Intrusion detection techniques in cloud computing. There are different types of attacks that are affecting the cloud are also discussed in this paper. The role of firewall and different intrusion detection techniques in cloud computing for preventing various attacks has also been discussed.

Authors and Affiliations

Aditya Bakshi
Department of Computer Science and Engineering, School of Computer Science and Engineering Shri Mata Vaishno Devi University , Lovely Professional University, Katra, India1, Phagwara, India
Department of Computer Science and Engineering Shri Mata Vaishno Devi University Katra, India

Cloud Computing, Firewall, Intrusion Detection System.

  1. Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, A Survey of intrusion detection technques in Cloud, Journal of Network and Computer Applications, Elsevier, 2013, pp. 42-57 
  2. Mohamed, A., Grundy, J., Ibrahim, A. S.: Adaptable, model-driven security engineering for SaaS cloud-based applications. Automated Software Engineering, vol. 21, pp. 187--224. Springer (2013)
  3. Ye Du, Li, R. Z. M.: Research on a Security Mechanism for Cloud Computing based on Virtualization. Telecommunication Systems, vol. 53, pp. 19—24, Springer (2013)
  4. Edurado, F. B., Monge. R., Hashizume K.: Building a Security Reference Architecture for Cloud Systems., Requirements Engineering, pp. 1—25. Springer (2015)
  5. Jin, H., Dong, M., Ota, K., Fan, M., Wang, G.: NetSecCC : A Scalable and Fault Tolerant Architecture for Cloud Computing Security. Peer-to-peer Networking and Applications, pp. 1—15, Springer (2014)
  6. P, Hu., Sung C. W., Ho, S., Chan, T. H.: Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds, Information Forensics and Security, vol. 11, pp. 388-399, IEEE (2014)
  7. Junwon, L., Cho, J., Seo, J., Shon, T., Won, D.: A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed, Mobile Networks and Applications, vol. 18, pp. 122-128, Springer (2012)
  8. Jin, L., Li, Y. K., Chen, X., Lee, P. P. C., Lou, W.: A Hybrid Cloud Approach for Secure Authorized Deduplication, Parallel and Distributed Systems, vol. 26, pp.1206--1216, IEEE Transactions (2014)
  9. Rahat, M.,Shibli, M. A., Niazi, M. A.: Cloud Identity Management Security Issues and Solutions : A Taxonomy, Complex Adaptive Systems Modeling, vol. 2, pp. 1 – 37, Springer (2014)
  10. Seungmin, R., Chang, H., Kim, S., Lee, Y. S.: An Efficient Peer-to-peer Distributed Scheduling for Cloud and Grid Computing, Peer-to-peer Networking and Applications, vol. 8, pp. 863 – 871, Springer (2014)
  11. Li, Q., Han, Q., Sun, L.: Collaborative Recognition of Queuing Behavior on Mobile Phones, Mobile Computing, vol. 15, pp. 60 – 73, IEEE (2014)
  12. Tak, G. K., Badge N., Manwatkar, P., Rangnathan, A., Tapaswi, S.: Asynchronous Anti Phishing Image Captcha Approach towards Phishing, International Conference on Future Computer and Communication, vol. 3, pp. 694 – 698, IEEE (2010)
  13. Malhotra, K., Gardner, S., Patz, R.: Implementation of elliptic-curve cryptography on mobile healthcare devices, IEEE (2007)

Publication Details

Published in : Volume 2 | Issue 7 | September 2017
Date of Publication : 2017-09-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 121-126
Manuscript Number : CSEIT174416
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Aditya Bakshi, Sunanda, "Comparison of Intrusion Detection Techniques in Cloud Computing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 7, pp.121-126, September-2017.
Journal URL :

Article Preview

Follow Us

Contact Us