www.tjprc.org editor@tjprc.org
INTRUSION DETECTION SYSTEM AND PREVENTION
SYSTEM IN CLOUD COMPUTING USING SNORT
SUNITA KUMAWAT
1
, ANJALI KUMAWAT
2
& ANIL KUMAR SHARMA
3
1,2
Research Scholar, Govt. Women Engineering College, Rajasthan, India
2
Assistant Professor, Govt. Women Engineering College, Rajasthan, India
ABSTRACT
As according to the current scenario, the security of the data is on threat and the protection from intruders is
very important, organizations are paying a huge amount to secure their confidential data from intruders. But they are
very sharp. Same as well the current systems are not capable enough to detect all the attacks which are occurring in the
system. In order to fix this problem and to reduce the number of false alarms, intrusion detection method for the illegal
access to the cloud server is proposed. Here in this article, we have proposed a hybrid model for intrusion detection
system for cloud computing, which have enhanced quality of detecting the unknown attack via anomaly based detection
and also have module which will try to reduce the number of false alarm generated by the system.
Keywords: Attacks, Intrusion, Cloud Computing, Snort Tool, System Security, IDS, Detection, Prevention
Received: Nov 13, 2015; Accepted: Nov 24, 2015; Published: Nov 28, 2015; Paper Id.: IJCSEITRDEC20155
INTRODUCTION
Attacks on the nation’s computer infrastructures are becoming an increasingly serious Problem. Even
though the problem is ubiquitous, government agencies are particularly appealing targets and they tend to be more
willing to reveal such events than commercial Organizations. This is demonstrated by the cases cited below. While
statistics on the growth of attacks provide a more solid basis for justifying the need for intrusion detection (ID),
case histories can often be more persuasive. Since many different mechanisms were opted by organizations in the
form of intrusion detection and prevention systems to protect themselves from these kinds of attacks, there are
many security breaches which go undetected. In order to understand the security risks and IDPS(intrusion
detection and prevention system), we will first survey about the common security breaches and then after discuss
what are different opportunities and challenges in this particular field.[1]
RELATED WORK
Intrusion detection system comprises of management unit and detection engine. The management unit is
to manage the reporting part or manage how the output reports is generated if there is any intrusion is find and
detection engine are agents that monitors host and network in real time environment. Intrusion detection system
also has a database of attack signatures. These are the patters of different attacks which are attacked previously in
the system the purpose of saving this database is that when a detection engine detects the malicious packet it first
matches with the database of known signature of attacks and if match was successful it generate a message and
pass to the management unit which further take appropriate actions regarding that malicious packet.
Original Article
International Journal of Computer Science Engineering
and Information Technology Research (IJCSEITR)
ISSN(P): 2249-6831; ISSN(E): 2249-7943
Vol. 5, Issue 6, Dec 2015, 31-40
© TJPRC Pvt. Ltd.