www.tjprc.org editor@tjprc.org INTRUSION DETECTION SYSTEM AND PREVENTION SYSTEM IN CLOUD COMPUTING USING SNORT SUNITA KUMAWAT 1 , ANJALI KUMAWAT 2 & ANIL KUMAR SHARMA 3 1,2 Research Scholar, Govt. Women Engineering College, Rajasthan, India 2 Assistant Professor, Govt. Women Engineering College, Rajasthan, India ABSTRACT As according to the current scenario, the security of the data is on threat and the protection from intruders is very important, organizations are paying a huge amount to secure their confidential data from intruders. But they are very sharp. Same as well the current systems are not capable enough to detect all the attacks which are occurring in the system. In order to fix this problem and to reduce the number of false alarms, intrusion detection method for the illegal access to the cloud server is proposed. Here in this article, we have proposed a hybrid model for intrusion detection system for cloud computing, which have enhanced quality of detecting the unknown attack via anomaly based detection and also have module which will try to reduce the number of false alarm generated by the system. Keywords: Attacks, Intrusion, Cloud Computing, Snort Tool, System Security, IDS, Detection, Prevention Received: Nov 13, 2015; Accepted: Nov 24, 2015; Published: Nov 28, 2015; Paper Id.: IJCSEITRDEC20155 INTRODUCTION Attacks on the nation’s computer infrastructures are becoming an increasingly serious Problem. Even though the problem is ubiquitous, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial Organizations. This is demonstrated by the cases cited below. While statistics on the growth of attacks provide a more solid basis for justifying the need for intrusion detection (ID), case histories can often be more persuasive. Since many different mechanisms were opted by organizations in the form of intrusion detection and prevention systems to protect themselves from these kinds of attacks, there are many security breaches which go undetected. In order to understand the security risks and IDPS(intrusion detection and prevention system), we will first survey about the common security breaches and then after discuss what are different opportunities and challenges in this particular field.[1] RELATED WORK Intrusion detection system comprises of management unit and detection engine. The management unit is to manage the reporting part or manage how the output reports is generated if there is any intrusion is find and detection engine are agents that monitors host and network in real time environment. Intrusion detection system also has a database of attack signatures. These are the patters of different attacks which are attacked previously in the system the purpose of saving this database is that when a detection engine detects the malicious packet it first matches with the database of known signature of attacks and if match was successful it generate a message and pass to the management unit which further take appropriate actions regarding that malicious packet. Original Article International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN(P): 2249-6831; ISSN(E): 2249-7943 Vol. 5, Issue 6, Dec 2015, 31-40 © TJPRC Pvt. Ltd.