publication . Article . Other literature type . 2013

Review: A survey of intrusion detection techniques in Cloud

Bhavesh Borisaniya; Hiren Patel; Muttukrishnan Rajarajan; Chirag Modi; Dhiren R. Patel; Avi Patel;
Open Access
  • Published: 01 Jan 2013 Journal: Journal of Network and Computer Applications, volume 36, pages 42-57 (issn: 1084-8045, Copyright policy)
  • Publisher: Elsevier BV
  • Country: United Kingdom
Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and integrity of Cloud resources and services. It examines proposals incorporating Intrusion Detection Systems (IDS) in Cloud and discusses various types and techniques of IDS ...
free text keywords: QA75, Computer security, computer.software_genre, computer, Intrusion detection system, Host-based intrusion detection system, Cloud computing, business.industry, business, Confidentiality, Cloud computing security, Computer science, Cloud resources, Next-generation network, Intrusion prevention system
65 references, page 1 of 5

[1] P. Mell, and T. Grance. (2011). The NIST Definition of Cloud Computing (Draft). NIST [Online]. Available: 145_cloud-definition.pdf

[2] Google apps. [Online]. Available:

[3] “Google apps engine.” [Online]. Available: URL

[4] Azure services platform. [Online]. Available:

[5] Amazon web services. [Online]. Available:

[6] Eucalyptus. [Online]. Available:

[7] Opennebula. [Online]. Available:

[8] International Data Corporation. 2009. [Online]. Available: s_2009.jpg, 2009.

[9] Lockheed Martin White Paper: Available: utingWhitePaper.pdf

[10] C. Brooks. Amazon EC2 Attack Prompts Customer Support Changes. Tech Target. [Online]. Available:,289142,sid20 1_gci1371090,00.html

[11] M. Slaviero, “BlackHat presentation demo vids: Amazon.” [Online]. Available:

[12] Y. Chen, and R. Sion, “On securing untrusted clouds with cryptography,” In WPES '10, pp. 109-114, 2010.

[13] J. Rutkowska, "Subverting VistaTM Kernel for Fun and Profit," Black Hat Conference, 2006.

[14] S. King, P. Chen, and Y-M. Wang, "SubVirt: Implementing malware with virtual machines," 2006 IEEE Symposium on Security and Privacy, 2006, pp.314-327.

[15] S. Bahram, X. Jiang, Z. Wang, and M. Grace, "DKSM: Subverting Virtual Machine Introspection for Fun and Profit," Proceedings of the 29th IEEE International Symposium on Reliable Distributed Systems, 2010.

65 references, page 1 of 5
Any information missing or wrong?Report an Issue