An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Title | An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Devi, B. T., Shitharth, S., Jabbar, M. A. |
Conference Name | 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) |
Date Published | March 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-4167-1 |
Keywords | attacks, authentication, browser malware-injection attacks, browser security, cloud computing, cloud computing security attacks, common security breaches, Flooding Attacks, Honey Pot, Honey pot (computing), honey pot attack, honey pots, Human Behavior, human factors, intrusion, Intrusion detection, Intrusion Detection Systems, invasive software, Malware, procedural intrusion way, pubcrawl, resilience, Resiliency, Scalability, security, security issues, Servers, specific honey pot algorithm, Virtual machining, wrapping attacks |
Abstract | Cloud computing provides so many groundbreaking advantages over native computing servers like to improve capacity and decrease costs, but meanwhile, it carries many security issues also. In this paper, we find the feasible security attacks made about cloud computing, including Wrapping, Browser Malware-Injection and Flooding attacks, and also problems caused by accountability checking. We have also analyzed the honey pot attack and its procedural intrusion way into the system. This paper on overall deals with the most common security breaches in cloud computing and finally honey pot, in particular, to analyze its intrusion way. Our major scope is to do overall security, analyze in the cloud and then to take up with a particular attack to deal with granular level. Honey pot is the one such attack that is taken into account and its intrusion policies are analyzed. The specific honey pot algorithm is in the queue as the extension of this project in the future. |
URL | https://ieeexplore.ieee.org/document/9074924/ |
DOI | 10.1109/ICIMIA48430.2020.9074924 |
Citation Key | devi_appraisal_2020 |
- Intrusion Detection
- wrapping attacks
- Virtual machining
- specific honey pot algorithm
- Servers
- security issues
- security
- Scalability
- Resiliency
- resilience
- pubcrawl
- procedural intrusion way
- malware
- invasive software
- Intrusion Detection Systems
- Browser Security
- intrusion
- Human Factors
- Human behavior
- honey pots
- honey pot attack
- Honey pot (computing)
- Honey Pot
- Flooding Attacks
- common security breaches
- cloud computing security attacks
- Cloud Computing
- browser malware-injection attacks
- authentication
- attacks