Intrusion detection systems in the cloud computing: A comprehensive and deep literature review

dc.contributor.authorLiu, Zhiqiang
dc.contributor.authorXu, Bo
dc.contributor.authorCheng, Bo
dc.contributor.authorHu, Xiaomei
dc.contributor.authorDarbandi, Mehdi
dc.date.accessioned2026-02-06T18:29:14Z
dc.date.issued2022
dc.departmentDoğu Akdeniz Üniversitesi
dc.description.abstractAbrupt development of resources and rising expenses of infrastructure are leading institutions to take on cloud computing. Albeit, the cloud environment is vulnerable to various sorts of attacks. So, recognizing malicious software is one of the principal challenges in cloud security governance. Intrusion detection system (IDS) has turned to the most generally utilized element of computer system security that asserts the cloud from diverse sorts of attacks and threats. As evident, no systematic literature review exists that focuses on cloud computing usage within IDS processes. The previous investigations had not considered the statistical analysis method. Hence, this paper examined the IDS mechanisms in cloud computing systematically. Twenty-two articles have been obtained using defined filters divided into four sections: hypervisor-based IDS, network-based IDS, machine learning-based IDS, and hybrid IDS. The comparison is performed depending on the outcomes illustrated in the investigations. It demonstrates that IDS precision, inclusiveness, overhead, and reaction time have been discussed in many studies. Simultaneously, less attention has been paid to cost-sensitivity, functioning, attack tolerance, and intrusion facing. This paper has made an excellent effort to organize literature drawn from multiple sources into a manuscript.
dc.identifier.doi10.1002/cpe.6646
dc.identifier.issn1532-0626
dc.identifier.issn1532-0634
dc.identifier.issue4
dc.identifier.scopus2-s2.0-85117903108
dc.identifier.scopusqualityQ1
dc.identifier.urihttps://doi.org/10.1002/cpe.6646
dc.identifier.urihttps://hdl.handle.net/11129/11345
dc.identifier.volume34
dc.identifier.wosWOS:000711739300001
dc.identifier.wosqualityQ3
dc.indekslendigikaynakWeb of Science
dc.indekslendigikaynakScopus
dc.language.isoen
dc.publisherWiley
dc.relation.ispartofConcurrency and Computation-Practice & Experience
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.snmzKA_WoS_20260204
dc.subjectanomaly detection
dc.subjectcloud computing
dc.subjectintrusion detection system
dc.subjectmachine learning
dc.subjectnetwork IDS
dc.subjectvirtual machines
dc.titleIntrusion detection systems in the cloud computing: A comprehensive and deep literature review
dc.typeReview Article

Files