Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systems

Author(s):  
Hamza Hammami ◽  
Hanen Brahmi ◽  
Sadok Ben Yahia
2019 ◽  
pp. 54-83
Author(s):  
Chiba Zouhair ◽  
Noreddine Abghour ◽  
Khalid Moussaid ◽  
Amina El Omri ◽  
Mohamed Rida

Security is a major challenge faced by cloud computing (CC) due to its open and distributed architecture. Hence, it is vulnerable and prone to intrusions that affect confidentiality, availability, and integrity of cloud resources and offered services. Intrusion detection system (IDS) has become the most commonly used component of computer system security and compliance practices that defends cloud environment from various kinds of threats and attacks. This chapter presents the cloud architecture, an overview of different intrusions in the cloud, the challenges and essential characteristics of cloud-based IDS (CIDS), and detection techniques used by CIDS and their types. Then, the authors analyze 24 pertinent CIDS with respect to their various types, positioning, detection time, and data source. The analysis also gives the strength of each system and limitations in order to evaluate whether they carry out the security requirements of CC environment or not.


Author(s):  
Azuan Ahmad ◽  
Bharanidharan Shanmugam ◽  
Norbik Bashah Idris ◽  
Ganthan Nayarana Samy ◽  
Sameer Hasan AlBakri

Author(s):  
Chiba Zouhair ◽  
Noreddine Abghour ◽  
Khalid Moussaid ◽  
Amina El Omri ◽  
Mohamed Rida

Security is a major challenge faced by cloud computing (CC) due to its open and distributed architecture. Hence, it is vulnerable and prone to intrusions that affect confidentiality, availability, and integrity of cloud resources and offered services. Intrusion detection system (IDS) has become the most commonly used component of computer system security and compliance practices that defends cloud environment from various kinds of threats and attacks. This chapter presents the cloud architecture, an overview of different intrusions in the cloud, the challenges and essential characteristics of cloud-based IDS (CIDS), and detection techniques used by CIDS and their types. Then, the authors analyze 24 pertinent CIDS with respect to their various types, positioning, detection time, and data source. The analysis also gives the strength of each system and limitations in order to evaluate whether they carry out the security requirements of CC environment or not.


Author(s):  
Rachid Cherkaoui ◽  
Mostapha Zbakh ◽  
An Braeken ◽  
Abdellah Touhafi

This chapter contains the state of the art of the latest security issues of cloud computing as well as security issues of internet of things (IoT) applications. It discusses the integration of IoT platforms with cloud computing services, security of the hosted data, intrusion and anomaly detection techniques used to detect attacks in virtualized networks. The chapter also discusses some of the lightweight anomaly detection techniques to use in integrated constrained devices' ecosystems with cloud computing environments. This chapter focuses on efficient integration of cloud hosting with IoT applications as well as integration of lightweight intrusion detection systems in the latter environments.


Sign in / Sign up

Export Citation Format

Share Document