Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud co...

Full description

Bibliographic Details
Main Authors: Omar Achbarou, My Ahmed El kiram, Salim El Bouanani
Format: Article
Language:English
Published: Universidad Internacional de La Rioja (UNIR) 2017-03-01
Series:International Journal of Interactive Multimedia and Artificial Intelligence
Subjects:
Online Access:http://www.ijimai.org/journal/node/1348
_version_ 1818505524094697472
author Omar Achbarou
My Ahmed El kiram
Salim El Bouanani
author_facet Omar Achbarou
My Ahmed El kiram
Salim El Bouanani
author_sort Omar Achbarou
collection DOAJ
description Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.
first_indexed 2024-12-10T21:51:57Z
format Article
id doaj.art-813e1e8408e7498b92256f84aeddc181
institution Directory Open Access Journal
issn 1989-1660
1989-1660
language English
last_indexed 2024-12-10T21:51:57Z
publishDate 2017-03-01
publisher Universidad Internacional de La Rioja (UNIR)
record_format Article
series International Journal of Interactive Multimedia and Artificial Intelligence
spelling doaj.art-813e1e8408e7498b92256f84aeddc1812022-12-22T01:32:10ZengUniversidad Internacional de La Rioja (UNIR)International Journal of Interactive Multimedia and Artificial Intelligence1989-16601989-16602017-03-0143616410.9781/ijimai.2017.4310ijimai.2017.4310Securing Cloud Computing from Different Attacks Using Intrusion Detection SystemsOmar AchbarouMy Ahmed El kiramSalim El BouananiCloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.http://www.ijimai.org/journal/node/1348AttackCloud ComputingSecurity
spellingShingle Omar Achbarou
My Ahmed El kiram
Salim El Bouanani
Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
International Journal of Interactive Multimedia and Artificial Intelligence
Attack
Cloud Computing
Security
title Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
title_full Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
title_fullStr Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
title_full_unstemmed Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
title_short Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
title_sort securing cloud computing from different attacks using intrusion detection systems
topic Attack
Cloud Computing
Security
url http://www.ijimai.org/journal/node/1348
work_keys_str_mv AT omarachbarou securingcloudcomputingfromdifferentattacksusingintrusiondetectionsystems
AT myahmedelkiram securingcloudcomputingfromdifferentattacksusingintrusiondetectionsystems
AT salimelbouanani securingcloudcomputingfromdifferentattacksusingintrusiondetectionsystems