Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud-Based Environment - 2018

Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud-Based Environment

Research Area:  Cloud Security

Abstract:

Cloud computing has gained an extreme importance nowadays. Every organization is getting attracted toward the Cloud computing due to its attractive features like cost saving, adaptability, etc. Although it offers the attractive features but still Cloud threats need great consideration. The insider threat is critically challenging in the Cloud-based environments. In order to mitigate from insider attacks in Clouds, the use of Intrusion detection system (IDS) is quite challenging. Every type of IDS has different methods of attack detection. So, single IDS cannot guarantee the protection from all types of attacks. Thus, in this paper, we have studied the various types of IDS and their features which made them either suitable or unsuitable for cloud computing. Also on the basis of review, required features for the Cloud-based IDS are identified.

Keywords:  

Author(s) Name:  Priya Oberoi,Sumit Mittal

Journal name:  Cyber Security

Conferrence name:  

Publisher name:  Springer

DOI:  10.1007/978-981-10-8536-9_11

Volume Information:  pp 101-109