Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/57127
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMishra, Preetien
dc.contributor.authorPilli, Emmanuel Sen
dc.contributor.authorVaradharajan, Vijayen
dc.contributor.authorTupakula, Udayaen
dc.date.accessioned2024-01-03T03:26:52Z-
dc.date.available2024-01-03T03:26:52Z-
dc.date.issued2017-01-01-
dc.identifier.citationJournal of Network and Computer Applications, v.77, p. 18-47en
dc.identifier.issn1095-8592en
dc.identifier.issn1084-8045en
dc.identifier.urihttps://hdl.handle.net/1959.11/57127-
dc.description.abstract<p>Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have provided a survey on several intrusion detection techniques for detecting intrusions in the cloud computing environment. Most of them provide a discussion over traditional misuse and anomaly detection techniques. Virtual Machine Introspection (VMI) techniques are very helpful in detecting various stealth attacks targeting user-level and kernel-level processes running in virtual machines (VMs) by placing the analyzing component outside the VM generally at hypervisor. Hypervisor Introspection (HVI) techniques ensure the hypervisor security and prevent a compromised hypervisor to launch further attacks on VMs running over it. Introspection techniques introspect the hypervisor by using hardware-assisted virtualization-enabled technologies. The main focus of our paper is to provide an exhaustive literature survey of various Intrusion Detection techniques proposed for cloud environment with an analysis of their attack detection capability. We propose a threat model and attack taxonomy in cloud environment to elucidate the vulnerabilities in cloud. Our taxonomy of IDS techniques represent the state of the art classification and provides a detailed study of techniques with their distinctive features. We have provided a deep insight into Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) based techniques in the survey. Specific research challenges are identified to give future direction to researchers. We hope that our work will enable researchers to launch and dive deep into intrusion detection approaches in a cloud environment.</p>en
dc.languageenen
dc.publisherAcademic Pressen
dc.relation.ispartofJournal of Network and Computer Applicationsen
dc.titleIntrusion detection techniques in cloud environment: A surveyen
dc.typeJournal Articleen
dc.identifier.doi10.1016/j.jnca.2016.10.015en
local.contributor.firstnamePreetien
local.contributor.firstnameEmmanuel Sen
local.contributor.firstnameVijayen
local.contributor.firstnameUdayaen
local.profile.schoolSchool of Science & Technologyen
local.profile.emailutupakul@une.edu.auen
local.output.categoryC1en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.publisher.placeUnited Kingdomen
local.format.startpage18en
local.format.endpage47en
local.peerreviewedYesen
local.identifier.volume77en
local.title.subtitleA surveyen
local.contributor.lastnameMishraen
local.contributor.lastnamePillien
local.contributor.lastnameVaradharajanen
local.contributor.lastnameTupakulaen
dc.identifier.staffune-id:utupakulen
local.profile.orcid0000-0001-5048-9797en
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1959.11/57127en
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitleIntrusion detection techniques in cloud environmenten
local.output.categorydescriptionC1 Refereed Article in a Scholarly Journalen
local.search.authorMishra, Preetien
local.search.authorPilli, Emmanuel Sen
local.search.authorVaradharajan, Vijayen
local.search.authorTupakula, Udayaen
local.uneassociationNoen
local.atsiresearchNoen
local.sensitive.culturalNoen
local.year.published2017en
local.fileurl.closedpublishedhttps://rune.une.edu.au/web/retrieve/124d8bf0-b3ac-42c6-809d-a991cd000230en
local.subject.for2020460407 System and network securityen
local.subject.seo2020220405 Cybersecurityen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
Appears in Collections:Journal Article
School of Science and Technology
Files in This Item:
1 files
File SizeFormat 
Show simple item record

SCOPUSTM   
Citations

186
checked on Jan 11, 2025
Google Media

Google ScholarTM

Check

Altmetric


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.