International Conference on Advances in Communication and Computing Technologies 2012 |
Foundation of Computer Science USA |
ICACACT - Number 2 |
August 2012 |
Authors: S. V. Narwane, S. L. Vaikole |
c21408ea-f1fd-48db-b6b9-25a9a0364708 |
S. V. Narwane, S. L. Vaikole . Intrusion Detection System in Cloud Computing Environment. International Conference on Advances in Communication and Computing Technologies 2012. ICACACT, 2 (August 2012), 9-17.
The Cloud computing system can be easily threatened by various attacks, because most of the cloud computing systems provide service to so many people who are not proven to be trustworthy. Due to their distributed nature, cloud computing environment are easy targets for intruders[1]. There are various Intrusion Detection Systems having various specifications to each. Cloud computing have two approaches i. e. Knowledge-based IDS and Behavior-Based IDS to detect intrusions in cloud computing. Behavior-Based IDS assumes that an intrusion can be detected by observing a deviation from normal to expected behavior of the system or user[2]s. Knowledge-based IDS techniques apply knowledge accumulated about specific attack . Knowledge-based IDS can't detect unknown attacks, but it uses rules and monitors a stream of event s to find malicious characteristics and set the new rules for unknown attacks. In this paper we proposed a system is to detect intrusions in the cloud computing using Behavior-based approach and knowledge-based approach. If first approach unable to detect the data, second approach again verifies the data and compare it with the signatures within the database. In the proposed system definitely we will have very low false positive alarm.