International Journal of Scientific & Technology Research Volume 1, Issue 4, May 2012 ISSN 2277-8616
67
IJSTR©2012
www.ijstr.org
Intrusion Detection System for
Cloud Computing
Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande
Abstract:- Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in
data transmission. Distributed model of cloud makes it vulnerable and prone to sophisticated distributed intrusion attacks like Distributed Denial of
Service (DDOS) and Cross Site Scripting (XSS). To handle large scale network access traffic and administrative control of data and application in cloud,
a new multi-threaded distributed cloud IDS model has been proposed. Our proposed cloud IDS handles large flow of data packets, analyze them and
generate reports efficiently by integrating knowledge and behavior analysis to detect intrusions.
————————————————————
1. Introduction
The term cloud is analogical to “Internet”. The term cloud
computing is based on cloud drawings used in the past to
represent telephone networks & later to depict internet in.
1. Ms. Parag K. Shelke, persuing the masters degree
in Computer Engineering from Sipna COET,
SGBAU university, Amravati (MH), India.(Author)
Email parag.shelke21@yahoo.in
2. Ms. Sneha Sontakke, persuing the masters degree
in Computer Engineering from Sipna COET,
SGBAU university, Amravati (MH), India.(Co-
author)
Email srsontakke21@gmail.com
3. Dr. A. D. Gawande, Head of Department-
Computer Science & Engg, Sipna COET, SGBAU
university, Amravati (MH), India.(Guide)
Email adgawande@rediffmail.com
Cloud computing is internet based computing where virtual
shared servers provide software, infrastructure, platform,
devices and other resources and hosting to customer as a
service on pay-as you-use basis. Figure 1. shows the
concept [7]. All the info that a digitized system has to offer
is provided as a service in the cloud computing model.
Users can access these services available on the “internet
cloud” without having any previous know-how on managing
the resources involved. Cloud users do not own the
physical infrastructure; rather they rent the usage from a
third- party provider. They consume resources as a service
and pay only for resources that they use. What they only
need is a personal computer and internet connection. Cloud
computing has revolutionized the IT world with its services
provisioning infrastructure, less maintenance cost, data &
services availability assurance, rapid accessibility and
scalability. Cloud computing has three basic abstraction
layers i.e. system layer (which is a virtual machine
abstraction of a server), the platform layer (a virtualized
operating system of a server) and application layer (that
includes web applications) [1]. Hardware layer is not
included as it does not directly offer to users. Cloud
computing also has three service models namely Platform
as a Service (PaaS), Infrastructure as a Service (IaaS) and
Software as a Service (SaaS) models. PaaS model
facilitates users by providing platform on which applications
can be developed and run. IaaS deliver services to users by
maintaining large infrastructures like hosting servers,
managing networks and other resources for clients. SaaS
model makes user worry free of installing and running
software services on its own machines. Presently,
Salesforce.com, Google and Amazon are the leading cloud
service providers who extend their services for storage,
application and computation on pay as per use basis. Data,
application and services non-availability can be imposed
through Denial of Service (DOS) or Distributed Denial of
Service (DDOS) attacks and both cloud service provider
and users become handicap to provide or receive cloud
services [2]. For such type of attacks Intrusion Detection
System (IDS) can be emplaced as a strong defensive
mechanism. IDSs are host-based, network-based and
distributed IDSs. Host based IDS (HIDS) monitors specific
host machines, network-based IDS (NIDS) identifies
intrusions on key network points and distributed IDS (DIDS)
operates both on host as well as network. IDSs produce
alerts for the administrators which are based on true