Redirigiendo al acceso original de articulo en 17 segundos...
Inicio  /  Future Internet  /  Vol: 14 Par: 3 (2022)  /  Artículo
ARTÍCULO
TITULO

A Survey on Intrusion Detection Systems for Fog and Cloud Computing

Victor Chang    
Lewis Golightly    
Paolo Modesti    
Qianwen Ariel Xu    
Le Minh Thao Doan    
Karl Hall    
Sreeja Boddu and Anna Kobusinska    

Resumen

The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hence, there is an absolute need to differentiate boundaries in personal information and cloud and fog computing globally and the adoption of specific information security policies and regulations. The goal of the security policy and framework for cloud and fog computing is to protect the end-users and their information, reduce task-based operations, aid in compliance, and create standards for expected user actions, all of which are based on the use of established rules for cloud computing. Moreover, intrusion detection systems are widely adopted solutions to monitor and analyze network traffic and detect anomalies that can help identify ongoing adversarial activities, trigger alerts, and automatically block traffic from hostile sources. This survey paper analyzes factors, including the application of technologies and techniques, which can enable the deployment of security policy on fog and cloud computing successfully. The paper focuses on a Software-as-a-Service (SaaS) and intrusion detection, which provides an effective and resilient system structure for users and organizations. Our survey aims to provide a framework for a cloud and fog computing security policy, while addressing the required security tools, policies, and services, particularly for cloud and fog environments for organizational adoption. While developing the essential linkage between requirements, legal aspects, analyzing techniques and systems to reduce intrusion detection, we recommend the strategies for cloud and fog computing security policies. The paper develops structured guidelines for ways in which organizations can adopt and audit the security of their systems as security is an essential component of their systems and presents an agile current state-of-the-art review of intrusion detection systems and their principles. Functionalities and techniques for developing these defense mechanisms are considered, along with concrete products utilized in operational systems. Finally, we discuss evaluation criteria and open-ended challenges in this area.

 Artículos similares

       
 
Adi Tal, Yishai Weinstein, Stuart Wollman, Mark Goldman and Yoseph Yechieli    
This research examines the interrelations in a complex hydrogeological system, consisting of a multi-layered coastal aquifer, the sea, and a surface reservoir (fish ponds) and the importance of the specific connection between the aquifer and the sea. The... ver más
Revista: Water

 
Norbert Brunner, Markus Starkl, Ponnusamy Sakthivel, Lakshmanan Elango, Subbaiah Amirthalingam, Chinniyampalayam E. Pratap, Munuswamy Thirunavukkarasu and Sundaram Parimalarenganayaki    
The objective of this study is to bring out the policy changes with respect to managed aquifer recharge (focusing on infiltration ponds), which in the view of relevant stakeholders may ease the problem of groundwater depletion in the context of Chennai C... ver más
Revista: Water

 
Miguel Herve,Nicolas Marinovic     Pág. 31 - 49
RESUMEN. El analisis de las caracteristicas geologicas y geocronologicas del Batolito Vicuna Mackenna, en la Cordillera de la Costa, al sur de Antofagasta, por los metodos K-Ar y Rb-Sr, permite definir seis eventos de intrusion en el Mesozoico medio-supe... ver más
Revista: Andean Geology