2021
DOI: 10.1002/cpe.6646
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection systems in the cloud computing: A comprehensive and deep literature review

Abstract: Abrupt development of resources and rising expenses of infrastructure are leading institutions to take on cloud computing. Albeit, the cloud environment is vulnerable to various sorts of attacks. So, recognizing malicious software is one of the principal challenges in cloud security governance. Intrusion detection system (IDS) has turned to the most generally utilized element of computer system security that asserts the cloud from diverse sorts of attacks and threats. As evident, no systematic literature revie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 204 publications
0
10
0
Order By: Relevance
“…The necessity of a more reliable cyber security system than IDSs is cemented by the fact that encrypted packets [119] are unseen by IDSs, hence these violations will not be registered earlier on in the process of intrusion, only to be realized when they have penetrated the network much deeply [120]. Subsequently, attackers mainly use them as the pathway to enter systems and networks [121].…”
Section: Common Non-artificial Intelligence Based Techniquesmentioning
confidence: 99%
“…The necessity of a more reliable cyber security system than IDSs is cemented by the fact that encrypted packets [119] are unseen by IDSs, hence these violations will not be registered earlier on in the process of intrusion, only to be realized when they have penetrated the network much deeply [120]. Subsequently, attackers mainly use them as the pathway to enter systems and networks [121].…”
Section: Common Non-artificial Intelligence Based Techniquesmentioning
confidence: 99%
“…During the SLR presented here, the search strings returned seven surveys [Ahmad et al 2022;Al-Dhaqm et al 2020b;Kanta et al 2020;Liu et al 2022;Mahapatra and Khan 2012;Prajapati and Shah 2020;Sikos 2020]. However, their main focus is different, as they address: cyber security in IoT-based cloud computing [Ahmad et al 2022], database forensic investigation process models [Al-Dhaqm et al 2020b], open source intelligence for smarter password cracking [Kanta et al 2020], intrusion detection systems in the cloud computing [Liu et al 2022], existing techniques against SQL injection attacks • Seufitelli, Brandão and Moro [Mahapatra and Khan 2012], secure data deduplication [Prajapati and Shah 2020], and packet for network forensics [Sikos 2020].…”
Section: Related Workmentioning
confidence: 99%
“…This critical infrastructure demands meticulous protection to prevent any adverse consequences that could potentially impact society at large. When considering network security, it's crucial to acknowledge that real-world data is often transmitted across long distances [4], [5]. This approach is commonly employed in cloud technologies as well.…”
Section: Introductionmentioning
confidence: 99%