Title: Intrusion detection and prevention of DDoS attacks in cloud computing environment: a review on issues and current methods

Authors: B.S. Kiruthika Devi; T. Subbulakshmi

Addresses: School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, India ' School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, India

Abstract: Cloud computing has emerged as the most successful service model for the IT/ITES community due to the various long-term incentives offered in terms of reduced cost, availability, reliability and improved QoS to the cloud users. Most of the applications already migrated to centralised data centres in the cloud. Due to the growing needs of the business model, more small and medium enterprises rely on the cloud because little investment would suffice on the infrastructure and hardware/software. The most alarming cyber-attack in the cloud that interrupts the availability of the cloud services is distributed denial of service (DDoS) attack. In this paper, various existing intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) and their positioning in the cloud are investigated and the essence of the current techniques in the literature is briefed in detail. The comprehensive review on the latest IDS/IPS solutions and their capabilities to detect and prevent intrusions in the cloud are explored and the comparisons of the methodology provides the researchers with the security issues/challenges exposed in the cloud computing environment. The significance of the design of a secure framework for cloud is also being emphasised for achieving improved security in the cloud.

Keywords: cloud computing; distributed denial of service; DDoS; intrusion detection system; IDS; intrusion prevention system; IPS; security.

DOI: 10.1504/IJCC.2023.134001

International Journal of Cloud Computing, 2023 Vol.12 No.5, pp.450 - 481

Received: 04 Oct 2019
Accepted: 27 Apr 2020

Published online: 10 Oct 2023 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article