A Survey on Intrusion Detection Systems for Fog and Cloud Computing

The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hen...

Full description

Bibliographic Details
Main Authors: Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu, Anna Kobusińska
Format: Article
Language:English
Published: MDPI AG 2022-03-01
Series:Future Internet
Subjects:
Online Access:https://www.mdpi.com/1999-5903/14/3/89
_version_ 1797471478613016576
author Victor Chang
Lewis Golightly
Paolo Modesti
Qianwen Ariel Xu
Le Minh Thao Doan
Karl Hall
Sreeja Boddu
Anna Kobusińska
author_facet Victor Chang
Lewis Golightly
Paolo Modesti
Qianwen Ariel Xu
Le Minh Thao Doan
Karl Hall
Sreeja Boddu
Anna Kobusińska
author_sort Victor Chang
collection DOAJ
description The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hence, there is an absolute need to differentiate boundaries in personal information and cloud and fog computing globally and the adoption of specific information security policies and regulations. The goal of the security policy and framework for cloud and fog computing is to protect the end-users and their information, reduce task-based operations, aid in compliance, and create standards for expected user actions, all of which are based on the use of established rules for cloud computing. Moreover, intrusion detection systems are widely adopted solutions to monitor and analyze network traffic and detect anomalies that can help identify ongoing adversarial activities, trigger alerts, and automatically block traffic from hostile sources. This survey paper analyzes factors, including the application of technologies and techniques, which can enable the deployment of security policy on fog and cloud computing successfully. The paper focuses on a Software-as-a-Service (SaaS) and intrusion detection, which provides an effective and resilient system structure for users and organizations. Our survey aims to provide a framework for a cloud and fog computing security policy, while addressing the required security tools, policies, and services, particularly for cloud and fog environments for organizational adoption. While developing the essential linkage between requirements, legal aspects, analyzing techniques and systems to reduce intrusion detection, we recommend the strategies for cloud and fog computing security policies. The paper develops structured guidelines for ways in which organizations can adopt and audit the security of their systems as security is an essential component of their systems and presents an agile current state-of-the-art review of intrusion detection systems and their principles. Functionalities and techniques for developing these defense mechanisms are considered, along with concrete products utilized in operational systems. Finally, we discuss evaluation criteria and open-ended challenges in this area.
first_indexed 2024-03-09T19:48:55Z
format Article
id doaj.art-0f6d1c91ca4246f6931e2b1fd1b08697
institution Directory Open Access Journal
issn 1999-5903
language English
last_indexed 2024-03-09T19:48:55Z
publishDate 2022-03-01
publisher MDPI AG
record_format Article
series Future Internet
spelling doaj.art-0f6d1c91ca4246f6931e2b1fd1b086972023-11-24T01:15:28ZengMDPI AGFuture Internet1999-59032022-03-011438910.3390/fi14030089A Survey on Intrusion Detection Systems for Fog and Cloud ComputingVictor Chang0Lewis Golightly1Paolo Modesti2Qianwen Ariel Xu3Le Minh Thao Doan4Karl Hall5Sreeja Boddu6Anna Kobusińska7Cybersecurity, Information Systems and AI Research Group, School of Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough TS1 3BX, UKCybersecurity, Information Systems and AI Research Group, School of Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough TS1 3BX, UKCybersecurity, Information Systems and AI Research Group, School of Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough TS1 3BX, UKCybersecurity, Information Systems and AI Research Group, School of Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough TS1 3BX, UKCybersecurity, Information Systems and AI Research Group, School of Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough TS1 3BX, UKCybersecurity, Information Systems and AI Research Group, School of Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough TS1 3BX, UKCybersecurity, Information Systems and AI Research Group, School of Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough TS1 3BX, UKInstitute of Computing Science, Poznan University of Technology, 60-965 Poznan, PolandThe rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hence, there is an absolute need to differentiate boundaries in personal information and cloud and fog computing globally and the adoption of specific information security policies and regulations. The goal of the security policy and framework for cloud and fog computing is to protect the end-users and their information, reduce task-based operations, aid in compliance, and create standards for expected user actions, all of which are based on the use of established rules for cloud computing. Moreover, intrusion detection systems are widely adopted solutions to monitor and analyze network traffic and detect anomalies that can help identify ongoing adversarial activities, trigger alerts, and automatically block traffic from hostile sources. This survey paper analyzes factors, including the application of technologies and techniques, which can enable the deployment of security policy on fog and cloud computing successfully. The paper focuses on a Software-as-a-Service (SaaS) and intrusion detection, which provides an effective and resilient system structure for users and organizations. Our survey aims to provide a framework for a cloud and fog computing security policy, while addressing the required security tools, policies, and services, particularly for cloud and fog environments for organizational adoption. While developing the essential linkage between requirements, legal aspects, analyzing techniques and systems to reduce intrusion detection, we recommend the strategies for cloud and fog computing security policies. The paper develops structured guidelines for ways in which organizations can adopt and audit the security of their systems as security is an essential component of their systems and presents an agile current state-of-the-art review of intrusion detection systems and their principles. Functionalities and techniques for developing these defense mechanisms are considered, along with concrete products utilized in operational systems. Finally, we discuss evaluation criteria and open-ended challenges in this area.https://www.mdpi.com/1999-5903/14/3/89cloud computingintrusion detection and preventionsecurityrecommendations for cloud computing and securityrecommendations for network securitydefense techniques
spellingShingle Victor Chang
Lewis Golightly
Paolo Modesti
Qianwen Ariel Xu
Le Minh Thao Doan
Karl Hall
Sreeja Boddu
Anna Kobusińska
A Survey on Intrusion Detection Systems for Fog and Cloud Computing
Future Internet
cloud computing
intrusion detection and prevention
security
recommendations for cloud computing and security
recommendations for network security
defense techniques
title A Survey on Intrusion Detection Systems for Fog and Cloud Computing
title_full A Survey on Intrusion Detection Systems for Fog and Cloud Computing
title_fullStr A Survey on Intrusion Detection Systems for Fog and Cloud Computing
title_full_unstemmed A Survey on Intrusion Detection Systems for Fog and Cloud Computing
title_short A Survey on Intrusion Detection Systems for Fog and Cloud Computing
title_sort survey on intrusion detection systems for fog and cloud computing
topic cloud computing
intrusion detection and prevention
security
recommendations for cloud computing and security
recommendations for network security
defense techniques
url https://www.mdpi.com/1999-5903/14/3/89
work_keys_str_mv AT victorchang asurveyonintrusiondetectionsystemsforfogandcloudcomputing
AT lewisgolightly asurveyonintrusiondetectionsystemsforfogandcloudcomputing
AT paolomodesti asurveyonintrusiondetectionsystemsforfogandcloudcomputing
AT qianwenarielxu asurveyonintrusiondetectionsystemsforfogandcloudcomputing
AT leminhthaodoan asurveyonintrusiondetectionsystemsforfogandcloudcomputing
AT karlhall asurveyonintrusiondetectionsystemsforfogandcloudcomputing
AT sreejaboddu asurveyonintrusiondetectionsystemsforfogandcloudcomputing
AT annakobusinska asurveyonintrusiondetectionsystemsforfogandcloudcomputing
AT victorchang surveyonintrusiondetectionsystemsforfogandcloudcomputing
AT lewisgolightly surveyonintrusiondetectionsystemsforfogandcloudcomputing
AT paolomodesti surveyonintrusiondetectionsystemsforfogandcloudcomputing
AT qianwenarielxu surveyonintrusiondetectionsystemsforfogandcloudcomputing
AT leminhthaodoan surveyonintrusiondetectionsystemsforfogandcloudcomputing
AT karlhall surveyonintrusiondetectionsystemsforfogandcloudcomputing
AT sreejaboddu surveyonintrusiondetectionsystemsforfogandcloudcomputing
AT annakobusinska surveyonintrusiondetectionsystemsforfogandcloudcomputing