Survey of Intrusion Detection Techniques in Cloud Computing

Authors

  • Suad Mohammed Othman Department of Information Technology, Faculty of Computer IT, University of Sana’a, Sana’a, Yemen
  • Adnan Yehia Al-mutawkkil Department of Information Technology, Faculty of Computer IT, University of Sana’a, Sana’a, Yemen
  • Amani Mohammed Alnashi Department of Information System, Faculty of Computer & IT, University of Sana’a, Sana’a, Yemen

DOI:

https://doi.org/10.59628/jast.v2i4.970

Keywords:

Intrusion Detection, Cloud Computing, Secu- rity, Classification, Techniques, Cyber Threats

Abstract

With the continued development of cloud computing environments, security measures have become more im-portant than ever. Intrusion detection systems (IDS) are considered one of the most critical security measures in cloud computing. Researchers aim to find effective technologies for detecting intrusions in cloud computing. This paper presents a comprehensive survey of the techniques used for Intrusion Detection in Cloud Computing and their classification. Specifically, it covers a range of techniques such as machine learning, and provides insights for researchers looking to develop more flexible and effective techniques for intrusion detection in cloud computing.

Downloads

Download data is not yet available.
Classification of IDS modern techniques in cloud computing.

Downloads

Published

2024-08-31

How to Cite

Othman, S. M., Al-mutawkkil, A. Y., & Alnashi, A. M. (2024). Survey of Intrusion Detection Techniques in Cloud Computing. Sana’a University Journal of Applied Sciences and Technology , 2(4), 363–374. https://doi.org/10.59628/jast.v2i4.970

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.