A Survey on Intrusion Detection Systems for Fog and Cloud Computing
Abstract
:1. Introduction
1.1. Scope of the Study
1.2. Background Information
1.3. Cloud Computing Security
- Confidentiality: This is the assurance that user information is kept private from unauthorized agents to access.
- Integrity: This is the assurance of data remaining accurate and unmodified from the original state.
- Availability: This assurance of data reliability is readily accessible to the authorized personnel upon request.
- A private cloud is deployed and managed within a single organization.
- A public cloud is deployed and managed in a third-party organization.
- A hybrid cloud consists of private and public cloud technologies.
- A community cloud consists of sharing computing resources within multiple organizations and has the management operations completed by an in-house IT department or third party.
1.4. Research Methodology
1.5. Contributions and Goals
- Proposing a methodology to identify new rules that should be operated in addition to cloud security policies and can be employed to evaluate the threats against cloud-based environments;
- Reviewing detailed studies addressing fog computing and intrusion detection security issues;
- Reviewing the available threats which can affect fog computing environments and intrusion detection technology, with a specific focus on the ones that cannot be employed in conventional systems;
- Identifying security regulations and policies, particularly the most preferred recommendations for Software-as-a-Service security guidelines.
2. Security Overview
2.1. Service-Oriented Systems, Applications, and Security
2.2. Review of Cloud Security
3. Security in Fog Computing
Security Challenges in Fog Computing
4. Intrusion Detection and Prevention Systems
4.1. Review of Intrusion Detection and Prevention
4.2. Purposes of Intrusion Detection and Prevention Systems
4.3. Intrusion Detection System Functionalities
- Ensuring records of information are correlated to actual events. Information can be stored and made available also to disconnected systems;
- It is essential that security administrators be notified of important events. The system can send notifications (alerts) by using different channels: messages on the system console, emails, text messages (SMS), trigger user-defined scripts, etc. The content of the message has mainly the purpose of notification. Full details are stored on the IDS;
- Report generation. Such outputs summarize detected events or provide relevant details about them;
- An IDS should be able to trigger defensive measures when a new threat is detected. For example, banning specific IP addresses or IP ranges associated with the origin of the anomalous activities. It may also protect the access to specific resources that need to be protected or are in danger by reconfiguring network devices such as routers and firewalls to prevent access to those resources;
- An IDS may alter the traffic to block malicious content (for example, mail attachments containing malware) and forward the part deemed safe;
- IDS technologies are not 100% accurate. Therefore, harmless activities may be classified as malicious (a false positive) or vice versa (a false negative). While detection rates can improve, errors cannot be totally eradicated.
4.4. Host-Based vs. Network-Based Intrusion Detection and Prevention Systems
4.5. Signature-Based Intrusion Detection Systems (SIDS)
4.6. An Anomaly-Based Intrusion Detection System (AIDS)
4.7. Statistics-Based Techniques
4.8. Knowledge-Based Techniques
4.9. Machine-Learning-Based Techniques
4.10. Clustering Techniques for the Intrusion Detection System
5. Intrusion Detection in Fog, Edge, and Cloud Computing
5.1. Fog Computing
5.1.1. Fog Computing Applications
5.1.2. Advantages of Fog Computing
- Data storage in fog computing will be able to minimize any delays in the transmission of data;
- Allowing to efficiently process and analyze the data for many applications (Industrial IoT Smart Cities);
- Providing interactions that are essential between the end-devices and cloud computing servers;
- Deploying a distributed network on a global scale that aids in reducing network downtime;
- Supporting service in real time and providing a reduced state of network latency.
5.2. Open-Successes for Fog Computing in the IoT Environment
5.2.1. Latency Constraints
5.2.2. Network Bandwidth Constraints
5.2.3. Uninterrupted Services
5.2.4. IoT Security Challenges
5.3. Applications of Fog Computing in IoT
5.3.1. Smart Home
5.3.2. Healthcare Activity Tracking
6. Intrusion Detection Overview
6.1. Providing Strong Intrusion Detection in Fog Computing
6.2. Providing Strong Intrusion Detection in Edge Computing
6.3. Providing Strong Intrusion Detection in Cloud Computing
6.4. Intrusion Detection in SDN for Fog and Cloud Computing
6.5. Intrusion Detection and Prevention System Functionality
7. Opportunities for Organizational Adoption of the Research
7.1. Methods of Defending Organizational Systems—Business Recommendations
7.1.1. NIDS or HIDS for a Business Strategy
7.1.2. Signature-Based or Anomaly-Based IDS for a Business Strategy
8. Case Studies
8.1. Adopting Content for Teaching and Learning in Higher Education
8.1.1. Teesside University
- -
- How to effectively perform an effective, ethical hacking and security analysis;
- -
- How to design and implement different network architectures used in industry, e.g., virtualized, mobile, and cloud-based systems;
- -
- How to deliver excellent server administration and enterprise server management;
- -
- How to secure computers and networks and implement intrusion detection/prevention systems;
- -
- How to perform risk assessment, data governance, and compliance.
8.1.2. Middlesbrough College
8.1.3. Xiang’an Campus of Xiamen University
8.1.4. Poznań University of Technology
8.2. Adopting Content for Healthcare Service Providers
8.2.1. National Health Service, UK
8.2.2. Polish e-Health Center
9. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Hussein, N.H.; Khalid, A. A survey of Cloud Computing Security challenges and solutions. J. Comput. Sci. Inf. Secur. 2016, 14, 52. [Google Scholar]
- Ryan, M.D. Cloud computing security: The scientific challenge, and a survey of solutions. J. Syst. Softw. 2013, 86, 2263–2268. [Google Scholar] [CrossRef] [Green Version]
- Kuyoro, S.O.; Ibikunle, F.; Awodele, O. Cloud Computing Security Issues and Challenges. Int. J. Comput. Netw. 2011, 3, 247–255. Available online: https://eprints.lmu.edu.ng/1390/ (accessed on 18 February 2022).
- Tripathi, A.; Mishra, A. Cloud computing security considerations. In Proceedings of the 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Xi’an, China, 14–16 September 2011; pp. 1–5. [Google Scholar] [CrossRef]
- Soa. 2021. Available online: https://www.ibm.com/nl-en/cloud/learn/soa (accessed on 18 February 2022).
- Chen, Y. Service-Oriented Computing and System Integration: Software, IoT, Big Data, and AI as Services, 6th ed.; Kendall Hunt Publishing: Dubuque, IA, USA, 2017. [Google Scholar]
- Rumez, M.; Grimm, D.; Kriesten, R.; Sax, E. An Overview of Automotive Service-Oriented Architectures and Implications for Security Countermeasures. IEEE Access 2020, 8, 221852–221870. [Google Scholar] [CrossRef]
- Grant, D.; Yeo, B. Enterprise integration using Service-Oriented Architecture. Issues Inf. Syst. 2021, 22, 164–177. [Google Scholar]
- Yangui, S.; Goscinski, A.; Drira, K.; Tari, Z.; Benslimane, D. Future generation of service-oriented computing systems. Future Gener. Comput. Syst. 2021, 118, 252–256. [Google Scholar] [CrossRef]
- Huang, M.; Liu, A.; Xiong, N.N.; Wang, T.; Vasilakos, A.V. An effective service-oriented networking management architecture for 5G-enabled internet of things. Comput. Netw. 2020, 173, 107208. [Google Scholar] [CrossRef]
- Choo, K.-K.R. The cyber threat landscape: Challenges and future research directions. Comput. Secur. 2011, 30, 719–731. [Google Scholar] [CrossRef]
- Sedjelmaci, H.; Senouci, S.M.; Abu-Rgheff, M.A. An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks. IEEE Internet Things J. 2014, 1, 570–577. [Google Scholar] [CrossRef]
- Cîrnu, C.E.; Rotună, C.I.; Vevera, A.V.; Boncea, R. Measures to Mitigate Cybersecurity Risks and Vulnerabilities in Service-Oriented Architecture. Stud. Inform. Control 2018, 27, 359–368. [Google Scholar] [CrossRef]
- Mishra, S.; Sharma, S.K.; Alowaidi, M.A. Analysis of security issues of cloud-based web applications. J. Ambient Intell. Humaniz. Comput. 2020, 12, 7051–7062. [Google Scholar] [CrossRef]
- Huang, C.; Chen, W.; Yuan, L.; Ding, Y.; Jian, S.; Tan, Y.; Chen, H.; Chen, D. Toward security as a service: A trusted cloud service architecture with policy customization. J. Parallel Distrib. Comput. 2021, 149, 76–88. [Google Scholar] [CrossRef]
- Nassif, A.B.; Abu Talib, M.; Nasir, Q.; Albadani, H.; Dakalbab, F.M. Machine Learning for Cloud Security: A Systematic Review. IEEE Access 2021, 9, 20717–20735. [Google Scholar] [CrossRef]
- Singh, J.; Singh, P.; Gill, S.S. Fog Computing: A Taxonomy, Systematic Review, Current Trends and Research Challenges. J. Parallel Distrib. Comput. 2021, 157, 56–85. [Google Scholar] [CrossRef]
- White Paper. Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are. Available online: http://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf (accessed on 28 January 2022).
- Chalapathi, G.S.S.; Chamola, V.; Vaish, A.; Buyya, R. Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions. In Fog/Edge Computing For Security, Privacy, and Applications; Chang, W., Wu, J., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 293–325. [Google Scholar] [CrossRef]
- Sabireen, H.; Neelanarayanan, V. A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. ICT Express 2021, 7, 162–176. [Google Scholar] [CrossRef]
- Rezapour, R.; Asghari, P.; Javadi, H.H.S.; Ghanbari, S. Security in fog computing: A systematic review on issues, challenges and solutions. Comput. Sci. Rev. 2021, 41, 100421. [Google Scholar] [CrossRef]
- Tamrakar, M.; Jain, S.; Doriya, R. Security Issues in Fog Computing. In Proceedings of the 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 6–8 May 2021; pp. 1853–1858. [Google Scholar] [CrossRef]
- Zhang, J.; Chen, B.; Zhao, Y.; Cheng, X.; Hu, F. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues. IEEE Access 2018, 6, 18209–18237. [Google Scholar] [CrossRef]
- An, X.; Su, J.; Lü, X.; Lin, F. Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 249. [Google Scholar] [CrossRef] [Green Version]
- Aldwairi, M.; Khamayseh, Y.; Al-Masri, M. Application of artificial bee colony for intrusion detection systems. Secur. Commun. Networks 2012, 8, 2730–2740. [Google Scholar] [CrossRef]
- Butun, I.; Morgera, S.D.; Sankar, R. A Survey of Intrusion Detection Systems in Wireless Sensor Networks. IEEE Commun. Surv. Tutorials 2013, 16, 266–282. [Google Scholar] [CrossRef]
- Handa, A.; Sharma, A.; Shukla, S.K. Machine learning in cybersecurity: A review. WIREs Data Min. Knowl. Discov. 2019, 9, e1306. [Google Scholar] [CrossRef]
- Gupta, H.; Sharma, S. Security Challenges in Adopting Internet of Things for Smart Network. In Proceedings of the 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), Bhopal, India, 18–19 June 2021; pp. 761–765. [Google Scholar] [CrossRef]
- Khraisat, A.; Gondal, I.; Vamplew, P.; Kamruzzaman, J. Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity 2019, 2, 20. [Google Scholar] [CrossRef]
- Sarnovsky, M.; Paralic, J. Hierarchical Intrusion Detection Using Machine Learning and Knowledge Model. Symmetry 2020, 12, 203. [Google Scholar] [CrossRef] [Green Version]
- Thorarensen, C. A Performance Analysis of Intrusion Detection with Snort and Security Information Management. 2021. Available online: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177602 (accessed on 18 February 2022).
- Teixeira, D.; Assunção, L.; Pereira, T.; Malta, S.; Pinto, P. OSSEC IDS Extension to Improve Log Analysis and Override False Positive or Negative Detections. J. Sens. Actuator Netw. 2019, 8, 46. [Google Scholar] [CrossRef] [Green Version]
- Saranya, T.; Sridevi, S.; Deisy, C.; Chung, T.D.; Khan, M.A. Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review. Procedia Comput. Sci. 2020, 171, 1251–1260. [Google Scholar] [CrossRef]
- Di Mauro, M.; Galatro, G.; Liotta, A. Experimental Review of Neural-Based Approaches for Network Intrusion Management. IEEE Trans. Netw. Serv. Manag. 2020, 17, 2480–2495. [Google Scholar] [CrossRef]
- Belgrana, F.Z.; Benamrane, N.; Hamaida, M.A.; Chaabani, A.M.; Taleb-Ahmed, A. Network Intrusion Detection System Using Neural Network and Condensed Nearest Neighbors with Selection of NSL-KDD Influencing Features. In Proceedings of the 2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS), Bali, Indonesia, 27–28 January 2021; pp. 23–29. [Google Scholar] [CrossRef]
- Carlin, S.; Curran, K. Cloud Computing Security. In Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments; IGI Global: Hershey, PA, USA, 2013; Available online: https://www.igi-global.com/chapter/cloud-computing-security/www.igi-global.com/chapter/cloud-computing-security/68920 (accessed on 18 February 2022).
- Injadat, M.N.; Moubayed, A.; Nassif, A.B.; Shami, A. Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 2020, 18, 1803–1816. [Google Scholar] [CrossRef]
- Wu, C.; Peng, Q.; Lee, J.; Leibnitz, K.; Xia, Y. Effective hierarchical clustering based on structural similarities in nearest neighbor graphs. Knowledge-Based Syst. 2021, 228, 107295. [Google Scholar] [CrossRef]
- Kraemer, F.A.; Braten, A.E.; Tamkittikhun, N.; Palma, D. Fog Computing in Healthcare–A Review and Discussion. IEEE Access 2017, 5, 9206–9222. [Google Scholar] [CrossRef]
- Stojkoska, B.R.; Trivodaliev, K. Enabling internet of things for smart homes through fog computing. In Proceedings of the 2017 25th Telecommunication Forum (TELFOR), Belgrade, Serbia, 21–22 November 2017; pp. 1–4. [Google Scholar] [CrossRef]
- Gia, T.N.; Jiang, M.; Rahmani, A.-M.; Westerlund, T.; Liljeberg, P.; Tenhunen, H. Fog Computing in Healthcare Internet of Things: A Case Study on ECG Feature Extraction. In Proceedings of the 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, Liverpool, UK, 26–28 October 2015; pp. 356–363. [Google Scholar] [CrossRef]
- Pirozmand, P.; Ghafary, M.A.; Siadat, S.; Ren, J. Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory. Wirel. Commun. Mob. Comput. 2020, 2020, e8819545. [Google Scholar] [CrossRef]
- Sönmez, F.Ö.; Günel, B. Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation. In Proceedings of the 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), Ankara, Turkey, 3–4 December 2018; pp. 38–44. [Google Scholar] [CrossRef]
- Peng, K.; Leung, V.C.M.; Zheng, L.; Wang, S.; Huang, C.; Lin, T. Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment. Wirel. Commun. Mob. Comput. 2018, 2018, e4680867. [Google Scholar] [CrossRef] [Green Version]
- Hosseinpour, F.; Amoli, P.V.; Plosila, J.; Hämäläinen, T.; Tenhunen, H. An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach. Int. J. Digit. Content Technol. Its Appl. 2016, 10, 34–36. Available online: https://jyx.jyu.fi/handle/123456789/54088 (accessed on 18 February 2022).
- Eskandari, M.; Janjua, Z.H.; Vecchio, M.; Antonelli, F. Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices. IEEE Internet Things J. 2020, 7, 6882–6897. [Google Scholar] [CrossRef]
- Nie, L.; Wu, Y.; Wang, X.; Guo, L.; Wang, G.; Gao, X.; Li, S. Intrusion Detection for Secure Social Internet of Things Based on Collaborative Edge Computing: A Generative Adversarial Network-Based Approach. IEEE Trans. Comput. Soc. Syst. 2021, 9, 134–145. [Google Scholar] [CrossRef]
- Lin, F.; Zhou, Y.; An, X.; You, I.; Choo, K.-K.R. Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices. IEEE Consum. Electron. Mag. 2018, 7, 45–50. [Google Scholar] [CrossRef]
- Mazzariello, C.; Bifulco, R.; Canonico, R. Integrating a network IDS into an open source Cloud Computing environment. In Proceedings of the 2010 Sixth International Conference on Information Assurance and Security, Atlanta, GA, USA, 23–25 August 2010; pp. 265–270. [Google Scholar] [CrossRef] [Green Version]
- Mehmood, Y.; Shibli, M.A.; Habiba, U.; Masood, R. Intrusion Detection System in Cloud Computing: Challenges and opportunities. In Proceedings of the 2013 2nd National Conference on Information Assurance (NCIA), Rawalpindi, Pakistan, 11–12 December 2013; pp. 59–66. [Google Scholar] [CrossRef]
- Monshizadeh, M.; Khatri, V.; Kantola, R. Detection as a service: An SDN application. In Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 19–22 February 2017; pp. 285–290. [Google Scholar] [CrossRef]
- El-Taj, H.; Najjar, F.; Alsenawi, H. Intrusion Detection and Prevention Response based on Signature-Based and Anomaly-Based: Investigation Study. Int. J. Comput. Sci. Inf. Secur. 2012, 10, 8. [Google Scholar]
- Chen, H. Research and Implementation of Information Security System of Campus Network in Branch Campus; Xiamen University: Xiamen, China, 2016. [Google Scholar]
- Ghafur, S.; Kristensen, S.; Honeyford, K.; Martin, G.; Darzi, A.; Aylin, P. A retrospective impact analysis of the WannaCry cyberattack on the NHS. NPJ Digit. Med. 2019, 2, 1–7. [Google Scholar] [CrossRef] [PubMed]
- Dymyt, M.; Dymyt, T. E-HEALTH as a Tool for Strengthening the Role of a Patient in the Process of Providing Health Services. Mod. Manag. Rev. 2018, 25, 21–34. [Google Scholar] [CrossRef] [Green Version]
- Furlepa, K.; Tenderenda, A.; Kozłowski, R.; Marczak, M.; Wierzba, W.; Śliwczyński, A. Recommendations for the Development of Telemedicine in Poland Based on the Analysis of Barriers and Selected Telemedicine Solutions. Int. J. Environ. Res. Public Health 2022, 19, 1221. [Google Scholar] [CrossRef]
- Al-Shqeerat, K.H.A.; Al-Shrouf, F.M.A.; Hassan, M.R.; Fajraoui, H. Cloud Computing Security Challenges in Higher Educational Institutions—A Survey. Int. J. Comput. Appl. 2017, 161, 22–29. Available online: https://www.ijcaonline.org/archives/volume161/number6/27154-2017913217 (accessed on 18 February 2022).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chang, V.; Golightly, L.; Modesti, P.; Xu, Q.A.; Doan, L.M.T.; Hall, K.; Boddu, S.; Kobusińska, A. A Survey on Intrusion Detection Systems for Fog and Cloud Computing. Future Internet 2022, 14, 89. https://doi.org/10.3390/fi14030089
Chang V, Golightly L, Modesti P, Xu QA, Doan LMT, Hall K, Boddu S, Kobusińska A. A Survey on Intrusion Detection Systems for Fog and Cloud Computing. Future Internet. 2022; 14(3):89. https://doi.org/10.3390/fi14030089
Chicago/Turabian StyleChang, Victor, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu, and Anna Kobusińska. 2022. "A Survey on Intrusion Detection Systems for Fog and Cloud Computing" Future Internet 14, no. 3: 89. https://doi.org/10.3390/fi14030089
APA StyleChang, V., Golightly, L., Modesti, P., Xu, Q. A., Doan, L. M. T., Hall, K., Boddu, S., & Kobusińska, A. (2022). A Survey on Intrusion Detection Systems for Fog and Cloud Computing. Future Internet, 14(3), 89. https://doi.org/10.3390/fi14030089