Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

TitleSecuring Cloud Computing from Different Attacks Using Intrusion Detection Systems
Publication TypeJournal Article
Year of Publication2017
AuthorsAchbarou, O., M. A. E. kiram, and S. E. Bouanani
JournalInternational Journal of Interactive Multimedia and Artificial Intelligence
ISSN1989-1660
IssueSpecial Issue on Advances and Applications in the Internet of Things and Cloud Computing
Volume4
Number3
Date Published03/2017
Pagination61-64
Abstract

Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

KeywordsAttack, Cloud Computing, Security
DOI10.9781/ijimai.2017.439
URLhttp://www.ijimai.org/journal/sites/default/files/files/2016/08/ijimai20174_3_9_pdf_60303.pdf
AttachmentSize
ijimai20174_3_9.pdf674.35 KB