Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

Abstract

Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

Authors and Affiliations

Omar Achbarou, My Ahmed El kiram, Salim El Bouanani

Keywords

Related Articles

Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This syst...

Performance Evaluation of AODV Routing Protocol in VANET with NS2

In intelligent transportation systems, the collaboration between vehicles and the road side units is essential to bring these systems to realization. The emerging Vehicular Ad Hoc Network (VANET) is becoming more and mor...

Conceptual Model for Smart Cities: Irrigation and Highway Lamps using IoT

Keeping in mind the need to preserve energy as well as utilize the available at its best the need was felt to develop a module that would be able to sort out the problem where resources such as water and electricity were...

A review about Smart Objects, Sensors, and Actuators

Smart Objects and the Internet of Things are two ideas which describe the future, walk together, and complement each other. Thus, the interconnection among objects can make them more intelligent or expand their intellige...

A Depth Video-based Human Detection and Activity Recognition using Multi-features and Embedded Hidden Markov Models for Health Care Monitoring Systems

Increase in number of elderly people who are living independently needs especial care in the form of healthcare monitoring systems. Recent advancements in depth video technologies have made human activity recognition (HA...

Download PDF file
  • EP ID EP328771
  • DOI 10.9781/ijimai.2017.439
  • Views 154
  • Downloads 0

How To Cite

Omar Achbarou, My Ahmed El kiram, Salim El Bouanani (2017). Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems. International Journal of Interactive Multimedia and Artificial Intelligence, 4(3), 61-64. https://europub.co.uk/articles/-A-328771