The exponential rise in the demand of the cloud computing technologies and applications have revitalized academia-industries to achieve efficient, reliable and Quality of Service (QoS) centric computing paradigm. However, exceedingly rise in cloud technologies has given rise to broadened-horizon for intruders to penetrate cloud products and services to get illegitimate access called intrusion. Although Cloud Service Provider requires fulfilling Service Level Agreement and secure computation to the allied users, the different service model and respective cloud computing architecture possesses security threats that require optimal Cloud Intrusion Detection System (CIDS). Increasing computing complexities invite parallelized threat probability, under such conditions developing a robust and efficient CIDS model has always been an open research area for researchers. In this survey paper, different CIDS models and their respective strengths and limitations have been discussed. Primarily, this paper discusses intrusion in cloud computing environment and various available CIDS models including Host-based CIDS, Network based CIDS, Virtual Machine Introspection based CIDS and Distributed CIDS. In addition, recent literatures pertaining to CIDS are also discussed. This survey paper revealed that implementing multiple CIDS models at the different levels of cloud architecture can enable timely and/or early intrusion detection, localization, neutralization and zero miss ratio.
Volume 11 | 03-Special Issue
Pages: 1617-1635