Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/57127
Title: | Intrusion detection techniques in cloud environment: A survey |
Contributor(s): | Mishra, Preeti (author); Pilli, Emmanuel S (author); Varadharajan, Vijay (author); Tupakula, Udaya (author) |
Publication Date: | 2017-01-01 |
DOI: | 10.1016/j.jnca.2016.10.015 |
Handle Link: | https://hdl.handle.net/1959.11/57127 |
Abstract: | | Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have provided a survey on several intrusion detection techniques for detecting intrusions in the cloud computing environment. Most of them provide a discussion over traditional misuse and anomaly detection techniques. Virtual Machine Introspection (VMI) techniques are very helpful in detecting various stealth attacks targeting user-level and kernel-level processes running in virtual machines (VMs) by placing the analyzing component outside the VM generally at hypervisor. Hypervisor Introspection (HVI) techniques ensure the hypervisor security and prevent a compromised hypervisor to launch further attacks on VMs running over it. Introspection techniques introspect the hypervisor by using hardware-assisted virtualization-enabled technologies. The main focus of our paper is to provide an exhaustive literature survey of various Intrusion Detection techniques proposed for cloud environment with an analysis of their attack detection capability. We propose a threat model and attack taxonomy in cloud environment to elucidate the vulnerabilities in cloud. Our taxonomy of IDS techniques represent the state of the art classification and provides a detailed study of techniques with their distinctive features. We have provided a deep insight into Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) based techniques in the survey. Specific research challenges are identified to give future direction to researchers. We hope that our work will enable researchers to launch and dive deep into intrusion detection approaches in a cloud environment.
Publication Type: | Journal Article |
Source of Publication: | Journal of Network and Computer Applications, v.77, p. 18-47 |
Publisher: | Academic Press |
Place of Publication: | United Kingdom |
ISSN: | 1095-8592 1084-8045 |
Fields of Research (FoR) 2020: | 460407 System and network security |
Socio-Economic Objective (SEO) 2020: | 220405 Cybersecurity |
Peer Reviewed: | Yes |
HERDC Category Description: | C1 Refereed Article in a Scholarly Journal |
Appears in Collections: | Journal Article School of Science and Technology
|
Files in This Item:
1 files
Show full item record
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.