International Journal of Applied Engineering Research ISSN 0973-4562 Volume 15, Number 7 (2020) pp. 628-630 © Research India Publications. http://www.ripublication.com 628 Analysis and Detection of Malware Using Intrusion Detection Technique for a Private Cloud Bhagya Roy 1 and Dr. Joby P P 2 1 Dept. Computer Science and Technology, St. Joseph’s College of Engineering and Technology, Palai, Kerala, India. 2 Dept. Computer Science and Technology, St. Joseph’s College of Engineering and Technology, Palai, Kerala, India. Abstract Network security is one of the most promising sectors of today’s world. For the easy access and storage most of the data’s are not being kept in the computer but instead it is kept in a place called “Cloud”. Cloud doesn’t require computer memory and can be accessed from anywhere. Security is the main concern when we are using cloud. Files and folder which are getting uploaded and downloaded from the cloud should be free from malware. So the analysis and also detection plays a very important role. Intrusion Detection System (IDS) is used to study about malware and is being used along with a private cloud. Keywords: Cloud, Security, Intrusion Detection I. INTRODUCTION Cloud computing is one among the emerging technologies which provide performance enhancement and also make use of technology smartly. In cloud nothing is stored in the computer; instead it is stored in a place called “cloud”. Most of the organizations are using cloud for their storage because it provides unlimited storage, so no worries about running out of storage. Organization uses mainly three services models including SaaS (Software as a Service), IaaS (Infrastructure as a Service) and PaaS (Platform as a Service) and deployment models including public, private, hybrid and community cloud. The advantages of cloud computing are cost-efficient, easy to maintain, backup and recovery etc. Rather than having many advantages, cloud computing also has disadvantages. Before one get registered to a cloud, one should be aware that we are surrending all our sensitive information to a third party server provider of a cloud. This is obviously a serious risk. This can be avoided for a extend by choosing a trustworthy service provider. Threats and attackers are the other issues in cloud. Since data is stored in cloud, it is vulnerable to external attack or threats. A public cloud is the most used deployment model but for accessing some features, paid versions should be taken which might be practically not possible. So, here a private cloud which is created for a small organization is described. A private cloud can act as a ‘protective fence’ built between an organization and attackers. II. WHAT IS PRIVATE CLOUD? Basically there are four types of cloud including public, private, hybrid and community cloud. Private clouds are models developed for and by IT department of a particular organization behind their own firewall. It involves secure and distinct cloud based environment. This model is similar to Local Area Network (LAN).But it has a virtual environment that discard many security issues and provide security. Some key properties of private cloud are described below: - No outside resources is needed to determine the private cloud - Support for protocols and linguistic transparency - Enable information exchange audit - Inter-cloud service exchange - Higher reliability and performance - Customizable and great control over hardware perfor- mance - Cost and energy efficiency Data encryption and security should be done for secure computing. This is generally done at the IP layer level using IPsec or at DTLS (protocol layer).The files and folders that are getting uploaded or downloaded to and from cloud should be free from malware. Malware are set of instructions that run on a computer and make it do something that an attacker wants to do. III. MALWARE DETECTION METHODS One of the significant challenges within the development of secure cloud is related to correct identification and detection of malware. This is due to the reality that, within the majority of cases, malware is the first factor of initiation for large scale. Distributed Denial of Service (DDoS) attacks, phisphy and email spamming etc. are some examples. There is huge effort made to study about the behaviour of certain malware in Internet. Generally they are termed as intrusion Detection System (IDS). IDS are a system that alert when some suspi- cious activity had generated in the network traffic. It scans a network for any unusual activity. Sometimes false alarms can