Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud co...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Universidad Internacional de La Rioja (UNIR)
2017-03-01
|
Series: | International Journal of Interactive Multimedia and Artificial Intelligence |
Subjects: | |
Online Access: | http://www.ijimai.org/journal/node/1348 |
_version_ | 1818505524094697472 |
---|---|
author | Omar Achbarou My Ahmed El kiram Salim El Bouanani |
author_facet | Omar Achbarou My Ahmed El kiram Salim El Bouanani |
author_sort | Omar Achbarou |
collection | DOAJ |
description | Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks. |
first_indexed | 2024-12-10T21:51:57Z |
format | Article |
id | doaj.art-813e1e8408e7498b92256f84aeddc181 |
institution | Directory Open Access Journal |
issn | 1989-1660 1989-1660 |
language | English |
last_indexed | 2024-12-10T21:51:57Z |
publishDate | 2017-03-01 |
publisher | Universidad Internacional de La Rioja (UNIR) |
record_format | Article |
series | International Journal of Interactive Multimedia and Artificial Intelligence |
spelling | doaj.art-813e1e8408e7498b92256f84aeddc1812022-12-22T01:32:10ZengUniversidad Internacional de La Rioja (UNIR)International Journal of Interactive Multimedia and Artificial Intelligence1989-16601989-16602017-03-0143616410.9781/ijimai.2017.4310ijimai.2017.4310Securing Cloud Computing from Different Attacks Using Intrusion Detection SystemsOmar AchbarouMy Ahmed El kiramSalim El BouananiCloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.http://www.ijimai.org/journal/node/1348AttackCloud ComputingSecurity |
spellingShingle | Omar Achbarou My Ahmed El kiram Salim El Bouanani Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems International Journal of Interactive Multimedia and Artificial Intelligence Attack Cloud Computing Security |
title | Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems |
title_full | Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems |
title_fullStr | Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems |
title_full_unstemmed | Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems |
title_short | Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems |
title_sort | securing cloud computing from different attacks using intrusion detection systems |
topic | Attack Cloud Computing Security |
url | http://www.ijimai.org/journal/node/1348 |
work_keys_str_mv | AT omarachbarou securingcloudcomputingfromdifferentattacksusingintrusiondetectionsystems AT myahmedelkiram securingcloudcomputingfromdifferentattacksusingintrusiondetectionsystems AT salimelbouanani securingcloudcomputingfromdifferentattacksusingintrusiondetectionsystems |