Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
Journal Title: International Journal of Interactive Multimedia and Artificial Intelligence - Year 2017, Vol 4, Issue 3
Abstract
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.
Authors and Affiliations
Omar Achbarou, My Ahmed El kiram, Salim El Bouanani
Virtual Planning and Intraoperative Navigation in Craniomaxillofacial Surgery
Surgery planning assisted by computer represents one important example of the collaboration between surgeons and engineers. Virtual planning allows surgeons to pre-do the surgery by working over a virtual 3D model of the...
Anomaly based Intrusion Detection using Modified Fuzzy Clustering
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security has become an increasingly vital field in computer science in response to the proliferation of private sensitive informa...
Robust Artificial Immune System in the Hopfield network for Maximum k-Satisfiability
Artificial Immune System (AIS) algorithm is a novel and vibrant computational paradigm, enthused by the biological immune system. Over the last few years, the artificial immune system has been sprouting to solve numerous...
Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment
Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming...
A Solution to the N-Queens Problem Using Biogeography-Based Optimization
Biogeography-based Optimization (BBO) is a global optimization algorithm based on population, governed by mathematics of biogeography, and dealing with geographical distribution of biological organisms. The BBO algorithm...