Review Paper on Attack Type and Intrusion Detection System in Cloud Computing Article Swipe
YOU?
·
· 2015
· Open Access
·
· DOI: https://doi.org/10.53555/nncse.v2i4.455
In any information system intrusions are the activities that damage the security and integrity of the system. Over the past few decades the network based system has grown at an explosive rate with innovations in communication and information technologies. While the computer network and their related applications brought the world together by bridging the information gap among people, it has also made it easier to leads unauthorized activity not only from external attackers but also from internal attackers, such as disgruntled employees and people abusing their privileges for personal gain. In this review paper we will try to traverse Cloud, Characteristics of Cloud, Application of Cloud, and Security issues related to Cloud. There is technique IDS which is used to detect Intrusion, we have to study this system with cloud computing concern. IDS should be used on Cloud model in a very effective way to sort out some security related challenges.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.53555/nncse.v2i4.455
- https://nnpub.org/index.php/CSE/article/download/455/407
- OA Status
- diamond
- References
- 7
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4210905367
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4210905367Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.53555/nncse.v2i4.455Digital Object Identifier
- Title
-
Review Paper on Attack Type and Intrusion Detection System in Cloud ComputingWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2015Year of publication
- Publication date
-
2015-04-30Full publication date if available
- Authors
-
Manoj Kumar Soni, Megha SinghList of authors in order
- Landing page
-
https://doi.org/10.53555/nncse.v2i4.455Publisher landing page
- PDF URL
-
https://nnpub.org/index.php/CSE/article/download/455/407Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://nnpub.org/index.php/CSE/article/download/455/407Direct OA link when available
- Concepts
-
Cloud computing, Computer security, Computer science, sort, Intrusion detection system, Cloud computing security, Intrusion, Bridging (networking), Cybercrime, The Internet, World Wide Web, Geochemistry, Operating system, Information retrieval, GeologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
7Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4210905367 |
|---|---|
| doi | https://doi.org/10.53555/nncse.v2i4.455 |
| ids.doi | https://doi.org/10.53555/nncse.v2i4.455 |
| ids.openalex | https://openalex.org/W4210905367 |
| fwci | 0.0 |
| type | article |
| title | Review Paper on Attack Type and Intrusion Detection System in Cloud Computing |
| biblio.issue | 4 |
| biblio.volume | 2 |
| biblio.last_page | 31 |
| biblio.first_page | 23 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9983000159263611 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T13038 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.989799976348877 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Internet of Things and AI |
| topics[2].id | https://openalex.org/T11614 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.989300012588501 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Cloud Data Security Solutions |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C79974875 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8674684762954712 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[0].display_name | Cloud computing |
| concepts[1].id | https://openalex.org/C38652104 |
| concepts[1].level | 1 |
| concepts[1].score | 0.7764668464660645 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[1].display_name | Computer security |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.681804358959198 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C88548561 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5346198678016663 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q347599 |
| concepts[3].display_name | sort |
| concepts[4].id | https://openalex.org/C35525427 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5140079259872437 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[4].display_name | Intrusion detection system |
| concepts[5].id | https://openalex.org/C184842701 |
| concepts[5].level | 3 |
| concepts[5].score | 0.5059720873832703 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q370563 |
| concepts[5].display_name | Cloud computing security |
| concepts[6].id | https://openalex.org/C158251709 |
| concepts[6].level | 2 |
| concepts[6].score | 0.46726861596107483 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q354025 |
| concepts[6].display_name | Intrusion |
| concepts[7].id | https://openalex.org/C174348530 |
| concepts[7].level | 2 |
| concepts[7].score | 0.41826942563056946 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q188635 |
| concepts[7].display_name | Bridging (networking) |
| concepts[8].id | https://openalex.org/C2779390178 |
| concepts[8].level | 3 |
| concepts[8].score | 0.4161335825920105 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q29137 |
| concepts[8].display_name | Cybercrime |
| concepts[9].id | https://openalex.org/C110875604 |
| concepts[9].level | 2 |
| concepts[9].score | 0.16914746165275574 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[9].display_name | The Internet |
| concepts[10].id | https://openalex.org/C136764020 |
| concepts[10].level | 1 |
| concepts[10].score | 0.1398729383945465 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[10].display_name | World Wide Web |
| concepts[11].id | https://openalex.org/C17409809 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q161764 |
| concepts[11].display_name | Geochemistry |
| concepts[12].id | https://openalex.org/C111919701 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[12].display_name | Operating system |
| concepts[13].id | https://openalex.org/C23123220 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q816826 |
| concepts[13].display_name | Information retrieval |
| concepts[14].id | https://openalex.org/C127313418 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q1069 |
| concepts[14].display_name | Geology |
| keywords[0].id | https://openalex.org/keywords/cloud-computing |
| keywords[0].score | 0.8674684762954712 |
| keywords[0].display_name | Cloud computing |
| keywords[1].id | https://openalex.org/keywords/computer-security |
| keywords[1].score | 0.7764668464660645 |
| keywords[1].display_name | Computer security |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.681804358959198 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/sort |
| keywords[3].score | 0.5346198678016663 |
| keywords[3].display_name | sort |
| keywords[4].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[4].score | 0.5140079259872437 |
| keywords[4].display_name | Intrusion detection system |
| keywords[5].id | https://openalex.org/keywords/cloud-computing-security |
| keywords[5].score | 0.5059720873832703 |
| keywords[5].display_name | Cloud computing security |
| keywords[6].id | https://openalex.org/keywords/intrusion |
| keywords[6].score | 0.46726861596107483 |
| keywords[6].display_name | Intrusion |
| keywords[7].id | https://openalex.org/keywords/bridging |
| keywords[7].score | 0.41826942563056946 |
| keywords[7].display_name | Bridging (networking) |
| keywords[8].id | https://openalex.org/keywords/cybercrime |
| keywords[8].score | 0.4161335825920105 |
| keywords[8].display_name | Cybercrime |
| keywords[9].id | https://openalex.org/keywords/the-internet |
| keywords[9].score | 0.16914746165275574 |
| keywords[9].display_name | The Internet |
| keywords[10].id | https://openalex.org/keywords/world-wide-web |
| keywords[10].score | 0.1398729383945465 |
| keywords[10].display_name | World Wide Web |
| language | en |
| locations[0].id | doi:10.53555/nncse.v2i4.455 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4220651265 |
| locations[0].source.issn | 2456-3552 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2456-3552 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Journal of Advance Research in Computer Science & Engineering (ISSN 2456-3552) |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | https://nnpub.org/index.php/CSE/article/download/455/407 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) |
| locations[0].landing_page_url | https://doi.org/10.53555/nncse.v2i4.455 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5054888721 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-0224-0166 |
| authorships[0].author.display_name | Manoj Kumar Soni |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I64295750 |
| authorships[0].affiliations[0].raw_affiliation_string | CIIT, Indore (M.P.), India |
| authorships[0].institutions[0].id | https://openalex.org/I64295750 |
| authorships[0].institutions[0].ror | https://ror.org/01hhf7w52 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I64295750 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Indian Institute of Technology Indore |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Manoj Kumar Soni |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | CIIT, Indore (M.P.), India |
| authorships[1].author.id | https://openalex.org/A5109062550 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Megha Singh |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I64295750 |
| authorships[1].affiliations[0].raw_affiliation_string | CIIT, Indore (M.P.), India. |
| authorships[1].institutions[0].id | https://openalex.org/I64295750 |
| authorships[1].institutions[0].ror | https://ror.org/01hhf7w52 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I64295750 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Indian Institute of Technology Indore |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Megha Singh |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | CIIT, Indore (M.P.), India. |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://nnpub.org/index.php/CSE/article/download/455/407 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Review Paper on Attack Type and Intrusion Detection System in Cloud Computing |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9983000159263611 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2338899373, https://openalex.org/W199254545, https://openalex.org/W4252285266, https://openalex.org/W2997836625, https://openalex.org/W4244102749, https://openalex.org/W111175386, https://openalex.org/W2476504758, https://openalex.org/W4248464163, https://openalex.org/W1937580673, https://openalex.org/W2133389611 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.53555/nncse.v2i4.455 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4220651265 |
| best_oa_location.source.issn | 2456-3552 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2456-3552 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Journal of Advance Research in Computer Science & Engineering (ISSN 2456-3552) |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | https://nnpub.org/index.php/CSE/article/download/455/407 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) |
| best_oa_location.landing_page_url | https://doi.org/10.53555/nncse.v2i4.455 |
| primary_location.id | doi:10.53555/nncse.v2i4.455 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4220651265 |
| primary_location.source.issn | 2456-3552 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2456-3552 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Journal of Advance Research in Computer Science & Engineering (ISSN 2456-3552) |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | https://nnpub.org/index.php/CSE/article/download/455/407 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) |
| primary_location.landing_page_url | https://doi.org/10.53555/nncse.v2i4.455 |
| publication_date | 2015-04-30 |
| publication_year | 2015 |
| referenced_works | https://openalex.org/W6633077795, https://openalex.org/W1994212840, https://openalex.org/W2182724703, https://openalex.org/W2590083862, https://openalex.org/W4231540666, https://openalex.org/W2187247723, https://openalex.org/W1492196703 |
| referenced_works_count | 7 |
| abstract_inverted_index.a | 140 |
| abstract_inverted_index.In | 0, 90 |
| abstract_inverted_index.an | 29 |
| abstract_inverted_index.as | 79 |
| abstract_inverted_index.at | 28 |
| abstract_inverted_index.be | 134 |
| abstract_inverted_index.by | 51 |
| abstract_inverted_index.in | 34, 139 |
| abstract_inverted_index.is | 113, 117 |
| abstract_inverted_index.it | 58, 62 |
| abstract_inverted_index.of | 14, 101, 104 |
| abstract_inverted_index.on | 136 |
| abstract_inverted_index.to | 64, 97, 110, 119, 124, 144 |
| abstract_inverted_index.we | 94, 122 |
| abstract_inverted_index.IDS | 115, 132 |
| abstract_inverted_index.and | 12, 36, 43, 82, 106 |
| abstract_inverted_index.any | 1 |
| abstract_inverted_index.are | 5 |
| abstract_inverted_index.but | 73 |
| abstract_inverted_index.few | 20 |
| abstract_inverted_index.for | 87 |
| abstract_inverted_index.gap | 55 |
| abstract_inverted_index.has | 26, 59 |
| abstract_inverted_index.not | 68 |
| abstract_inverted_index.out | 146 |
| abstract_inverted_index.the | 6, 10, 15, 18, 22, 40, 48, 53 |
| abstract_inverted_index.try | 96 |
| abstract_inverted_index.way | 143 |
| abstract_inverted_index.Over | 17 |
| abstract_inverted_index.also | 60, 74 |
| abstract_inverted_index.from | 70, 75 |
| abstract_inverted_index.have | 123 |
| abstract_inverted_index.made | 61 |
| abstract_inverted_index.only | 69 |
| abstract_inverted_index.past | 19 |
| abstract_inverted_index.rate | 31 |
| abstract_inverted_index.some | 147 |
| abstract_inverted_index.sort | 145 |
| abstract_inverted_index.such | 78 |
| abstract_inverted_index.that | 8 |
| abstract_inverted_index.this | 91, 126 |
| abstract_inverted_index.used | 118, 135 |
| abstract_inverted_index.very | 141 |
| abstract_inverted_index.will | 95 |
| abstract_inverted_index.with | 32, 128 |
| abstract_inverted_index.Cloud | 137 |
| abstract_inverted_index.There | 112 |
| abstract_inverted_index.While | 39 |
| abstract_inverted_index.among | 56 |
| abstract_inverted_index.based | 24 |
| abstract_inverted_index.cloud | 129 |
| abstract_inverted_index.gain. | 89 |
| abstract_inverted_index.grown | 27 |
| abstract_inverted_index.leads | 65 |
| abstract_inverted_index.model | 138 |
| abstract_inverted_index.paper | 93 |
| abstract_inverted_index.study | 125 |
| abstract_inverted_index.their | 44, 85 |
| abstract_inverted_index.which | 116 |
| abstract_inverted_index.world | 49 |
| abstract_inverted_index.Cloud, | 99, 102, 105 |
| abstract_inverted_index.Cloud. | 111 |
| abstract_inverted_index.damage | 9 |
| abstract_inverted_index.detect | 120 |
| abstract_inverted_index.easier | 63 |
| abstract_inverted_index.issues | 108 |
| abstract_inverted_index.people | 83 |
| abstract_inverted_index.review | 92 |
| abstract_inverted_index.should | 133 |
| abstract_inverted_index.system | 3, 25, 127 |
| abstract_inverted_index.abusing | 84 |
| abstract_inverted_index.brought | 47 |
| abstract_inverted_index.decades | 21 |
| abstract_inverted_index.network | 23, 42 |
| abstract_inverted_index.people, | 57 |
| abstract_inverted_index.related | 45, 109, 149 |
| abstract_inverted_index.system. | 16 |
| abstract_inverted_index.Security | 107 |
| abstract_inverted_index.activity | 67 |
| abstract_inverted_index.bridging | 52 |
| abstract_inverted_index.computer | 41 |
| abstract_inverted_index.concern. | 131 |
| abstract_inverted_index.external | 71 |
| abstract_inverted_index.internal | 76 |
| abstract_inverted_index.personal | 88 |
| abstract_inverted_index.security | 11, 148 |
| abstract_inverted_index.together | 50 |
| abstract_inverted_index.traverse | 98 |
| abstract_inverted_index.attackers | 72 |
| abstract_inverted_index.computing | 130 |
| abstract_inverted_index.effective | 142 |
| abstract_inverted_index.employees | 81 |
| abstract_inverted_index.explosive | 30 |
| abstract_inverted_index.integrity | 13 |
| abstract_inverted_index.technique | 114 |
| abstract_inverted_index.Intrusion, | 121 |
| abstract_inverted_index.activities | 7 |
| abstract_inverted_index.attackers, | 77 |
| abstract_inverted_index.intrusions | 4 |
| abstract_inverted_index.privileges | 86 |
| abstract_inverted_index.Application | 103 |
| abstract_inverted_index.challenges. | 150 |
| abstract_inverted_index.disgruntled | 80 |
| abstract_inverted_index.information | 2, 37, 54 |
| abstract_inverted_index.innovations | 33 |
| abstract_inverted_index.applications | 46 |
| abstract_inverted_index.unauthorized | 66 |
| abstract_inverted_index.communication | 35 |
| abstract_inverted_index.technologies. | 38 |
| abstract_inverted_index.Characteristics | 100 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.6000000238418579 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.3773135 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |