Security Testing Using Intrusion Detection System in Cloud Computing
DOI:
https://doi.org/10.21512/emacsjournal.v2i3.6543Keywords:
Cloud Computing, Cyber Security, Intrusion Detection SystemAbstract
The development of technology is very fast, one of them is cloud computing. Cloud computing has been used from various circles and began to be developed. There are various problems that arise in cloud computing, such as problems from data, whether the data will be safe. To ensure that the data is safe, several methods or tools can be used. In this scientific work we use the Intrusion Detection System as an aid tool needed to access the network, including whether packages can protect data in cloud computing. Although the intrusion detection system there are still some shortcomings such as only being able to read some data and the performance will decrease the data very much. To overcome this it is necessary to use several additional tools such as the Intrusion Prevention System which is a refinement of the Intrusion Detection System and using the AES algorithmReferences
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Elsevier, 357-383.
Amato, F., Moscato, F., Moscato, V., & Colace, F. (2017). Improving Security in Cloud by Formal Modeling of IaaS Resource. Elsevier, 754-764.
Babu, V. S., & Kumar, M. M. (2018). An Efficient and Secure Data Storage Operations in Mobile Cloud Computing . IJSRSET.
Baykara, M., & Das, R. (2018). A novel honeypot based security approach for real-time intrusion detection and prevention system. ELSEVIER, 103-116.
Farhaoui, Y. (2016). How to secure web servers by the intrusion prevention system (IPS). International Journal of Advanced Computer Research, 2277-7970.
geeksforgeeks.org. (t.thn.). Intrusion Detection System. Diambil kembali dari geeksforgeeks: https://www.geeksforgeeks.org/intrusion-detection-system-ids/.
Jakimoski, K. (2016). Security Techniques for Data Protection in Cloud Computing. International Journal of Grid and Distributed Computing, 49-56.
Khan, N., & Al-Yasir, A. (2016). Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework. ELSEVIER, 485-490.
Lee, B. H., Dewi, E. K., & Wajdi, M. F. (2018). Data Security in Cloud Computing Using AES Under HEROKU Cloud. IEEE.
Park, J. H., & Park, J. H. (2017). Blockchain Security in Cloud Computing: Use Cases,Challenges,and Solutions. Symmetry, 9.
Rahman, A. (2019, Desember 13). 2019 Data Violations Caused by Internal Persons. Diambil kembali dari Cyberthreat: https://cyberthreat.id/read/4221/Pelanggaran-Data-Tahun-2019-yang-Diakibatkan-Orang-Internal.
Saadi, C., & Chaoui, H. (2016). Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb. ELSEVIER, 433-442.
Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. SCITEPRESS, 108-116.
Subhashini, D. P. (2018). A Study on Cloud Computing Securities and Algorithms. International Journal of Scientific Research in Compter Science, Engineering and Information Technology, 2456-3307.
Tchifilionova, V. (t.thn.). Security and Privacy Implications of Cloud Computing – Lost in the Cloud. National Laboratory of Computer Virology, Bulgarian Academy of Sciences 1113 Sofia.
Ventkatesh, M. S. (2018). A Study of Data Storage Security Issues in Cloud Computing. Vosal.
Wang, R. (2016). Research on data security technology based on cloud storage. 13th Global Congress on Manufacturing and Management.
Downloads
Published
Issue
Section
License
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to EMACS journal and Research and Technology Transfer (RTTO) Bina Nusantara University as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms and any other similar reproductions, as well as translations. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, such as electronic, electrostatic and mechanical copies, photocopies, recordings, magnetic media, etc., will be allowed only with a written permission from EMACS journal and Research and Technology Transfer (RTTO) Bina Nusantara University.
EMACS journal and Research and Technology Transfer Office Bina Nusantara University, the Editors and the reviewer make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in the EMACS journal are sole and exclusive responsibility of their respective authors and advertisers.
USER RIGHTS
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows:
• Creative Commons Attribution (CC-BY)
• Creative Commons Attribution-Share alike (CC BY-SA)