Intrusion Detection & Prevention Systems based on Cloud: Current Challenges, Advances, and Future Prospects
Keywords:
IDPS, Cloud Security, Edge ComputingAbstract
Cloud computing changed how web apps operate. Faster growth brought new risks, such as traffic floods, password-guessing attacks, and hidden software flaws. Basic security tools struggle in this area because they can't handle the size. They often mistakenly flag safe actions, miss encrypted streams, and fail to see across different tech environments. Even advanced options like Google’s Security Command Centre, Azure Sentinel, and AWS GuardDuty don’t fully deliver when reliability, flexibility, or information sharing is important. We are testing a stronger shield that runs on devices, operates within cloud networks, and connects multiple providers. This model combines behaviour checks with common attack signs to improve coverage. To enhance accuracy, it explores various methods for threat detection, thereby reducing false alarms. Since it allows for sharing danger information across cloud systems, risks are detected more quickly. Security logs remain secure over time by using blockchain technology. Zero Trust continuously checks users and tasks, preventing hidden threats from spreading. Research shows that combining team efforts with different tactics helps identify issues faster, improve operations, and manage complex cloud systems without crashing. Some also suggest updates, such as stronger cloud security or self-healing IDPS tools, that could offer additional benefits.
Downloads
Published
Conference Proceedings Volume
Section
License
Copyright (c) 2026 DMPedia Lecture Notes in Multidisciplinary Research

This work is licensed under a Creative Commons Attribution 4.0 International License.