A REVIEW OF INTRUSION DETECTION AND BLOCKCHAIN APPLICATIONS IN THE CLOUD: APPROACHES, CHALLENGES AND SOLUTIONS

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

Blog Article

This paper reviews the background and related studies in the areas of cloud systems, intrusion detection and blockchain applications against cyber attacks.This work aims to discuss collaborative anomaly detection systems for discovering insider and outsider attacks from cloud centres, including the technologies of virtualisation and containerisation, along with trusting intrusion detection and cloud systems using blockchain.Moreover, the ability 7201 diablosport predator 2 to detect such malicious attacks is critical for conducting necessary mitigation, at an early stage, to minimise the impact of disruption and restore cloud operations and their live migration processes.This paper presents an overview of cloud architecture and categorises potential state-of-the-art security events based on their occurrence at different cloud deployment models.Network Intrusion Detection Systems (NIDS) in the cloud, involving types of classification and common detection approaches, are also described.

Collaborative NIDSs for cloud-based blockchain applications are also explained to demonstrate how blockchain can address challenges missy minzy related to data privacy and trust management.A summary of the research challenges and future research directions in these fields is also explained.

Report this page