A Study of Various Attacks and Intrusion Detection System in Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 173 | Views: 511 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 7 Issue 7, July 2018 | Popularity: 6.5 / 10


     

A Study of Various Attacks and Intrusion Detection System in Cloud

Piyush Pareta, Manish Rai


Abstract: Cloud computing is the computing that uses resources either software or hardware over the Internet. It is the computing over the network. Today, almost every IT services are provided using this innovative technology. Cloud computing is the model that provides convenient on demand access of various services by using shared pool of configurable computing resources. Using of such shared pool of computing resources, this computing is targeted by various Cloud intruders, attackers and therefore exists number of new risks and threats due to its operational dependency over the network i. e. distributed environment which has number of vulnerabilities. In order to solve this security problem, there are number of security solution, models and schemes. This paper explains about security issues in cloud and focuses on various kinds of attacks such as Insider Attack, Man-in-the Middle Attack, DoS Attacks. Lastly it explains the need of effective Intrusion Detection and Prevention System in order to overcome such attacks.


Keywords: CSP Cloud Service Provider, Threats, Attacks, Security, DoS Denial of Service, SSL Secure Socket Layer, DS Digital Signature


Edition: Volume 7 Issue 7, July 2018


Pages: 33 - 36



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Piyush Pareta, Manish Rai, "A Study of Various Attacks and Intrusion Detection System in Cloud", International Journal of Science and Research (IJSR), Volume 7 Issue 7, July 2018, pp. 33-36, https://www.ijsr.net/getabstract.php?paperid=ART20183668, DOI: https://www.doi.org/10.21275/ART20183668

Similar Articles

Downloads: 138 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal, Renuka Singh

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, United States of America, Volume 12 Issue 11, November 2023

Pages: 998 - 1004

AI-Infused Threat Detection and Incident Response in Cloud Security

Sumanth Tatineni

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 3, March 2022

Pages: 1275 - 1279

A Novel Technique for Authorship Verification of Hijacked Online Social Networks User Accounts

Astha Gupta, Mahesh Parmar

Share this Article
Top