Abrupt development of resources and rising expenses of infrastructure are leading institutions to take on cloud computing. Albeit, the cloud environment is vulnerable to various sorts of attacks. So, recognizing malicious software is one of the principal challenges in cloud security governance. Intrusion detection system (IDS) has turned to the most generally utilized element of computer system security that asserts the cloud from diverse sorts of attacks and threats. As evident, no systematic literature review exists that focuses on cloud computing usage within IDS processes. The previous investigations had not considered the statistical analysis method. Hence, this paper examined the IDS mechanisms in cloud computing systematically. Twenty-two articles have been obtained using defined filters divided into four sections: hypervisor-based IDS, network-based IDS, machine learning-based IDS, and hybrid IDS. The comparison is performed depending on the outcomes illustrated in the investigations. It demonstrates that IDS precision, inclusiveness, overhead, and reaction time have been discussed in many studies. Simultaneously, less attention has been paid to cost-sensitivity, functioning, attack tolerance, and intrusion facing. This paper has made an excellent effort to organize literature drawn from multiple sources into a manuscript.
Fog computing has arisen to complement cloud computing, offering a cost-effective architecture to power the Internet of things. Fog computing is a network computing and service paradigm that expands cloud computing and services to the network's edge to solve the cloud's fundamental shortcomings, like a lack of location awareness, mobility, and latency. Besides, fog devices may have security issues because fog nodes are near end-users and have limited computational power. As the linked devices in the Internet of things grow exponentially, so does the potential for cyber-attack. Intrusion detection systems have been developed as a feasible tool for detecting and preventing harmful activity in this vein. This work used a systematic literature review to examine intrusion detection system approaches in a fog environment. By categorizing intrusion detection systems in the literature, we produce a review. An intrusion detection system's characteristic is early identification of an attack and the decrease of false alarms as a result. Some of the issues that these systems' designers will face are also discussed. Recall rate, detection rates, detection delay, and detection precision were the parameters that received the most attention. This report will serve as a roadmap for future network intrusion detection studies in fog computing.
1• Numerous fog nodes are managed and controlled by a cloud computing center.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.