Intrusion Detection System in Cloud: A Survey
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 11
Abstract
Cloud Computing is becoming popular day by day as many enterprise applications and data are moving into cloud based platforms .With the increasing use and demand of Cloud computing, security has become the major concern. Attack prevention measures such as authentication, encryption alone are not the solution for this; hence Intrusion Detection Systems have come into focus. we need a second wall of defense known as Intrusion Detection Systems (IDSs), to detect and produce responses if necessary. Since cloud computing is distributed in nature, supports multi-user and multi-domain platform, it is more prone to security threats. In this paper an attempt has been made to identify recent approaches used for intrusion detection in cloud. Moreover, the security threats and background of intrusion detection techniques in cloud are discussed.
Authors and Affiliations
Neenu Daniel
An Adaptive Rate Aware Session Admission Control for Mobile Ad Hoc Networks
Providing quality of service (QoS) guarantee in a mobile ad hoc network (MANET) is not easy due to node mobility, contention for channel access, a lack of central synchronization, and the unpredictable nature of the wir...
Voltage Stability Enhancement in SCIG Based Wind Farm Using Facts with Unbalanced Fault
The stability of fixed speed wind turbines can be improved by a STATCOM, which is well known and documented in literature for balanced grid voltage dips. Under unbalanced grid voltage dips the negative sequence voltage...
A review of genetic algorithm for metal cutting processes and a research agenda
Quality of finished product manufactured by metal cutting process depends on various machining factors. Similarly the chemical composition of work piece material also plays important role .So before processing we must k...
Performance Analysis of an OFDM System for Different channel Models
In today’s world depending on the requirements in the wireless communication, a system which provides high capacity and high performance and yields lower bit error rate (BER) value is preferred. Orthogonal frequency div...
Composite Cutting
There are very few process involved in cutting of composites that includes water jet cutting and laser cutting only but both the process have lot of disadvantage and are uneconomical at both machining and environmental...