IJIRST –International Journal for Innovative Research in Science & Technology| Volume 2 | Issue 12 | May 2016 ISSN (online): 2349-6010 All rights reserved by www.ijirst.org 170 A Review of IDS Scheme for Prohibiting the Accessibility of Intrusions in Cloud Computing Environment Prashant Singh Bramah Hazela Department of Computer Science & Engineering Department of Computer Science & Engineering Amity School of Engineering & Technology, Amity University, Lucknow Amity School of Engineering & Technology, Amity University, Lucknow Abstract Cloud computing seems as a computational model along with a distributed architecture and its foremost goal is to offer on demand services, for instance networks, applications, storage, services etc . on the basis of pay per usage basis. Though cloud technology provides various benefits but there is also a fact that few barriers exist which push the user back for adopting it. Hence, the barrier is security. Earlier, one of the promising solution is firewall could not be enough to manage entire cloud security issues at all and must not keep higher expectation with it about resolving all kind of threats or attacks. Intrusion detection system (IDS) is all about to detect and prevent the malicious behaviour on the cloud computing. Here, the focus is to explore security concerns or detecting cloud threats while adopting the cloud technology and generate an optimize way to reduce the risk level of intrusion by applying the prevention technique. Evaluation process must take place for evaluation new proposed methodology on the basis of performance, accuracy, time consumption etc. Keywords: Cloud computing, IDS, Anomaly, Signature, HIDS, NIDS, SNORT _______________________________________________________________________________________________________ I. INTRODUCTION Cloud computing means a kind of distributed parallel computing consisting of virtualized systems that are interconnected with each other and presented them as one or more unified computing resources based on service level agreements established through negotiation between the service provider and consumer. The nature of cloud Computing environment is distributed environment; hence the systems are highly vulnerable so there is maximum chance of exploiting attacks by the intruders. The intruders are the one who uses the services without any authorization and misuses the perquisites. The intrusion detection means the process of detecting the individual who misuses the advantage assigned to them and one who access the data or service of legitimate user without any authorization. The intrusion detection system was formed to discover the intruders trying to exploit attacks in the network. Data are at the core of IT security concerns for any organization, whatever the form of infrastructure that is used. Cloud computing does not alter this, but it surely does bring an added focus because of the distributed nature of the cloud computing infrastructure and the shared accountabilities that it involves. Security considerations apply both to data at rest (held on some form of storage system) and also to data in stir (being transferred over some form of communication link), both of which may need particular attention when using cloud computing services. Essentially, the questions relating to data for cloud computing are about several way of risk: risk of theft or unauthorized disclosure of data, risk of manipulating or unauthorized alteration of data, risk of loss or of unavailability of data. It is also worth remembering that in the context of cloud computing, data assets may well include things such as application programs or machine images, that can have the similar hazard considerations as the contents of databases. Cloud computing provides a framework for supporting end users effortlessly attaching powerful services and applications through Internet. II. INTRUSION DETECTION SYSTEMS (IDS) Intrusion detection systems are an essential component of defensive measures protecting computer systems and network against harm abuse. It becomes crucial part in the Cloud computing environment. The main aim of IDS is to detect computer attacks and possibly prevent activities that may compromise or harm the system security, integrity[3]. If there any illegitimate activity found the IDS alert the administrator for blocking or suspending suspected ones. IDS tools are capable of distinguishing between insider attacks originating from inside the organization i.e employees or customers and external ones such as attacks and the threat posed by attackers [3].