Open Access   Article Go Back

Survey on an Intrusion Detection Systems Within Cloud Environment

Montather Ghalib ALi1 , Fadl Mutaher Ba-Alwi2 , Ghaleb H. Al-Gaphari3

Section:Survey Paper, Product Type: Journal Paper
Volume-9 , Issue-4 , Page no. 41-55, Apr-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i4.4155

Online published on Apr 30, 2021

Copyright © Montather Ghalib ALi, Fadl Mutaher Ba-Alwi, Ghaleb H. Al-Gaphari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Montather Ghalib ALi, Fadl Mutaher Ba-Alwi, Ghaleb H. Al-Gaphari, “Survey on an Intrusion Detection Systems Within Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.4, pp.41-55, 2021.

MLA Style Citation: Montather Ghalib ALi, Fadl Mutaher Ba-Alwi, Ghaleb H. Al-Gaphari "Survey on an Intrusion Detection Systems Within Cloud Environment." International Journal of Computer Sciences and Engineering 9.4 (2021): 41-55.

APA Style Citation: Montather Ghalib ALi, Fadl Mutaher Ba-Alwi, Ghaleb H. Al-Gaphari, (2021). Survey on an Intrusion Detection Systems Within Cloud Environment. International Journal of Computer Sciences and Engineering, 9(4), 41-55.

BibTex Style Citation:
@article{ALi_2021,
author = {Montather Ghalib ALi, Fadl Mutaher Ba-Alwi, Ghaleb H. Al-Gaphari},
title = {Survey on an Intrusion Detection Systems Within Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2021},
volume = {9},
Issue = {4},
month = {4},
year = {2021},
issn = {2347-2693},
pages = {41-55},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5324},
doi = {https://doi.org/10.26438/ijcse/v9i4.4155}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i4.4155}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5324
TI - Survey on an Intrusion Detection Systems Within Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Montather Ghalib ALi, Fadl Mutaher Ba-Alwi, Ghaleb H. Al-Gaphari
PY - 2021
DA - 2021/04/30
PB - IJCSE, Indore, INDIA
SP - 41-55
IS - 4
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
444 424 downloads 178 downloads
  
  
           

Abstract

The decentralized nature of cloud computing paradigms has resulted class computing which prone to cyber-attacks and intrusions. One of major security matters in cloud is conducting intruder detection approaches for detecting and preventing network intrusions. The aim of this research paper is to review and analyze the research domain of collaborative, cooperative and distributed intrusion detection approaches within cloud environment. The research paper focusses on articles related to the keywords: cooperative, distributed, collaborative and their variations in three major databases, namely ScienceDirect, Springer Nature and the Institute of Electrical and Electronics Engineers’ Xplore. Such databases are sufficiently cover the literature techniques related to the aforementioned keywords. The collected dataset consists of 23 articles, the largest proportion of them focuses on model’s development that leverage collaborative intruder detection approaches, while the rest presents frameworks for intruder detection approaches. This study presents real analyses performed on available work: models, framework limitations and motivations. The study also, specifies the gap of the most state of the art related to cooperative and provides an extensive resource background for researchers who are interested in enhancing the performance of CIDSs within cloud environment. Finally, the paper suggests a new ensemble deep learning based model for improving the performance of proactive multi-cloud cooperative intrusion detection system.

Key-Words / Index Term

Cloud Computing, Cooperative Intrusion Detection System, Distributed Intrusion Detection System, Collaborative Intrusion Detection System

References

[1] Adel Abusitta, Martine Bellaiche ?, Michel Dagenais, Talal Halabi, “A deep learning approach for proactive multi-cloud cooperative intrusion detection system”, Future Generation Computer Systems, vol. 98 ,pp. 308–318 2019.
[2] Nurudeen Mahmud Ibrahim, Universiti Teknologi Johor Bahru, Malaysia Anazida Zainal “A Distributed Intrusion Detection Scheme for Cloud Computing”, International Journal of Distributed Systems and Technologies ,vol.11 • Issue 1 pp. 68-82• January-March 2020
[3] Mohamed Idhammada,_, Karim Afdela, Mustapha Belouchb “Distributed Intrusion Detection System for Cloud Environments based on Data Mining technique”, Procedia Computer Science ,vol.127 ,pp. 35–41 ,(2018)
[4] Azuan Ahmad1, Mohd Nazri Kama2, Azri Azmi2, and Norbik Bashah Idris3 “Collaborative Cloud IDS in Detecting Denial of Service by Dendritic Cell Mechanism”, International Journal of Electrical and Electronic Engineering & Telecommunications Vol. 8, No. 4, July 2019
[5] Omar Achbarou(&), My Ahmed El Kiram, Outmane Bourkoukou, and Salim Elbouanani “Multi-agent System-Based Distributed Intrusion Detection System for a Cloud Computing”, International Conference on Model and Data Engineering MEDI 2018: New Trends in Model and Data Engineering , (CCIS, volume 929), pp. 98–107, 2018
[6] Rim Ben Fekih1(&) and Farah Jemili2 “Distributed Architecture of an Intrusion Detection System Based on Cloud Computing and Big Data Techniques”, International conference on the Sciences of Electronics, Technologies of Information and Telecommunications
[7] SETIT 2018: Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol.1 pp 192-20.
[8] A.A. Ujeniya1*, R.D. Pawar2 , S.A. Sonawane3 , S.B. Shingade4 , S.R. Khonde5, “Hybrid Distributed Intrusion Detection System”, International Journal of Computer Sciences and Engineering pp .232-237 Vol..6, Issue.12, Dec 2018
[9] Mohamed Belaoued1, Abdelouahid Derhab 2, Smaine Mazouzi 3, And Farrukh Aslam Khan 2 “MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware”, SpecialL Section on Emerging Approaches To Cyber Security, Journal of IEEE Access , VOLUME 8, 2020, Issue.10, pp.66-75, 2012. doi: 10.1109/ACCESS.2020.2966321
[10] Upasana Nagar, Priyadarsi Nanda, Xiangjian He , Zhiyuan(Thomas) Tan “A framework for data security in cloud using collaborative intrusion detection scheme”, Proceedings of the 10th International Conference on Security of Information and Networks Pages 188–193(2017)
[11] Yasir Mehmood; Muhammad Awais Shibli; Ayesha Kanwal; Rahat Masood, “Distributed intrusion detection system using mobile agents in cloud computing environment”, in: 2015 Conference on Information Assurance and Cyber Security (CIACS), Rawalpindi, Pakistan,2015
[12] Hassani Mohamed; Lebbat Adil; Tallal Saida; Medromi Hicham, “A collaborative intrusion detection and Prevention System in Cloud Computing” , Pointe aux Piments, Mauritius,2013
[13] Xiaoguang Han1 , Jigang Sun2 , Wu Qu3, 4*, Xuanxia Yao1, “Distributed malware detection based on binary file features in cloud computing environment”, in 2014The 26th Chinese Control and Decision Conference (2014 CCDC), Changsha, China, pp.438-488
[14] Adel Abusitta, Martine Bellaiche & Michel Dagenais ,“Multi-cloud cooperative intrusion detection system: trust and fairness assurance Annals of Telecommunications, vol. 74, pp.637–653(2019)
[15] A. M. Aleesa1 , B. B. Zaidan2 ,A. A. Zaidan2 Nan M. Sahar1, “Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions” , Neural Computing and Applications vol. 32, pp.9827–9858(2020)
[16] Shaohua Teng; Naiqi Wu; Haibin Zhu; Luyao Teng; Wei Zhang, “SVM-DT-based adaptive and collaborative intrusion detection, IEEE/CAA Journal of Automatica Sinica ,Vol: 5, pp: 108 – 118, Issue: 1, Jan. 2018
[17] Amin Nezarat1 • Yaser Shams2“A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment”, The Journal of Supercomputing vol: 73, pp 4407–4427,2017
[18] R. Kesavamoorthy & K. Ruba Soundar , “Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system”, Cluster Computing, vol 22, pp 9469–9476(2019)
[19] Omar Achbarou, My Ahmed El Kiram and Salim Elbouanani, “Cloud Security: A Multi Agent Approach Based Intrusion Detection System”, Indian Journal of Science and Technology, , Vol: 10, Issue: 18, pp: 1-6 2017
[20] Weizhi Meng, Wenjuan Li, Laurence T,Yang & Peng Li , “Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain”, International Journal of Information Security volume 19, pages279–290(2020)
[21] Nour Moustafa, Gideon Creech, Elena Sitnikova, Marwa Keshk “Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing”, International Journal of Scientific Research in Network Security and Communication, Vol.1, No.5, pp.1-4, 2013.
[22] Zouhair Chiba,Noreddine Abghour,Khalid Moussaid,Amina El omri,Mohamed Rida, “Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms”, Computers & Security,Vol 86, pp, 291-317,2019
[23] Murat Özalp, Cihan Karakuzu, Ahmet Zengin,, “Distributed Intrusion Detection Systems: A Survey”, Academic Perspective Procedia, Vol, 2, Issue 3, Pp, 400-407,2019
[24] Sahil Garg a,b,?, Kuljeet Kaur a,b, Shalini Batra b, Gagangeet Singh Aujla c,d, Graham Morgan c, Neeraj Kumar b, Albert Y. Zomaya e, Rajiv Ranjan c, “En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment ”, Journal of Parallel and Distributed Computing Volume 135 , pp 219-233,(2020)
[25] Saadia Ghribi, Amel Meddeb Makhlouf and Faouzi Zarai, “Multi-layer Cooperative Intrusion Detection System for Cloud Environment” In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) – Vol: 6: pp:36-44 2017
[26] P. Patil1* , T. Bagwan2 , S. Kulkarni3 , C. Lobo4 , S.R. Khonde5, “Multi-Attacks Detection in Distributed System using Machine Learning”, International Journal of Computer Sciences and Engineering, Vol..7, Issue.1, pp. 601-605, Jan 2019
[27] Dr. Manish Kumar1 , Ashish Kumar Singh2, “Distributed Intrusion Detection System using Blockchain and Cloud Computing Infrastructure”,in 2020 International Conference on Trends in Electronics and Informatics (ICOEI)(48184), Tirunelveli, India pp,248-252 2020
[28] Song Deng1 , Ai-Hua Zhou2 , Dong Yue1 , Bin Hu2 , Li-Peng Zhu2 , “Distributed intrusion detection based on hybrid gene expression programming and cloud computing in a cyber physical power system”, IET Control Theory Appl., Vol. 11 Iss. 11, pp. 1822-1829,2017
[29] Osama Alkadi; Nour Moustafa; Benjamin Turnbull; Kim-Kwang Raymond Choo, “A Deep Blockchain Framework-enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks”, IEEE Internet of Things Journal, ,pp, 1 - 1 ,2020
[30] Hamid Reza Ghorbani , Roya Salek Shahrezaie “Toward a Policy-based Distributed Intruison Detection System in Cloud Computing Using Data Mining Approaches” , in 2015 International Congress on Technology, Communication and Knowledge (ICTCK), Mashhad, Iran, pp, 412-419,2015