Message d'état

PURL test ID: finland

A multi-criteria analysis of intrusion detection architectures in cloud environments

TitreA multi-criteria analysis of intrusion detection architectures in cloud environments
Publication TypeConference Paper
Year of Publication2015
AuthorsZbakh, M, Elmahdi, K, Cherkaoui, R, Enniari, S
Conference NameProceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015
Abstract

Cloud computing promises to increase innovation and the velocity with which applications are deployed all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the March of cloud continues, it brings both new opportunities and new security challenges. To take advantage of those opportunities while minimizing risks, we argue that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed in 1980s. Since that time IDSs are evolving. However, even several efforts have been made in the area of Intrusion Detection Systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi-criteria analysis and a comparative study between several IDS architectures designed to work in cloud computing environments. To achieve this objective, in the first place we will search in the state of the art for several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi-criteria decision analysis MacBeth (Measuring Attractiveness by a Categorical Based Evaluation Technique) we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps. © 2015 IEEE.

URLhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84962845309&doi=10.1109%2fCloudTech.2015.7336967&partnerID=40&md5=1128e7690631b70d9247248b05a81a50
DOI10.1109/CloudTech.2015.7336967
Revues: 

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        CEDOC ST2I : 06 66 39 75 16

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:641,428
    Education - This is a contributing Drupal Theme
    Design by WeebPal.