International Journal of Applied Engineering Research ISSN 0973-4562 Volume 15, Number 7 (2020) pp. 628-630
© Research India Publications. http://www.ripublication.com
628
Analysis and Detection of Malware Using Intrusion Detection Technique
for a Private Cloud
Bhagya Roy
1
and Dr. Joby P P
2
1
Dept. Computer Science and Technology, St. Joseph’s College of Engineering and Technology, Palai, Kerala, India.
2
Dept. Computer Science and Technology, St. Joseph’s College of Engineering and Technology, Palai, Kerala, India.
Abstract
Network security is one of the most promising sectors of
today’s world. For the easy access and storage most of the
data’s are not being kept in the computer but instead it is kept
in a place called “Cloud”. Cloud doesn’t require computer
memory and can be accessed from anywhere. Security is the
main concern when we are using cloud. Files and folder which
are getting uploaded and downloaded from the cloud should
be free from malware. So the analysis and also detection plays
a very important role. Intrusion Detection System (IDS) is
used to study about malware and is being used along with a
private cloud.
Keywords: Cloud, Security, Intrusion Detection
I. INTRODUCTION
Cloud computing is one among the emerging technologies
which provide performance enhancement and also make use of
technology smartly. In cloud nothing is stored in the computer;
instead it is stored in a place called “cloud”. Most of the
organizations are using cloud for their storage because it
provides unlimited storage, so no worries about running out
of storage. Organization uses mainly three services models
including SaaS (Software as a Service), IaaS (Infrastructure as
a Service) and PaaS (Platform as a Service) and deployment
models including public, private, hybrid and community
cloud. The advantages of cloud computing are cost-efficient,
easy to maintain, backup and recovery etc.
Rather than having many advantages, cloud computing also
has disadvantages. Before one get registered to a cloud, one
should be aware that we are surrending all our sensitive
information to a third party server provider of a cloud. This is
obviously a serious risk. This can be avoided for a extend by
choosing a trustworthy service provider. Threats and attackers
are the other issues in cloud. Since data is stored in cloud, it is
vulnerable to external attack or threats. A public cloud is the
most used deployment model but for accessing some features,
paid versions should be taken which might be practically
not possible. So, here a private cloud which is created for
a small organization is described. A private cloud can act as a
‘protective fence’ built between an organization and attackers.
II. WHAT IS PRIVATE CLOUD?
Basically there are four types of cloud including public,
private, hybrid and community cloud. Private clouds are
models developed for and by IT department of a particular
organization behind their own firewall. It involves secure and
distinct cloud based environment. This model is similar to
Local Area Network (LAN).But it has a virtual environment
that discard many security issues and provide security.
Some key properties of private cloud are described below:
- No outside resources is needed to determine the private
cloud
- Support for protocols and linguistic transparency
- Enable information exchange audit
- Inter-cloud service exchange
- Higher reliability and performance
- Customizable and great control over hardware perfor-
mance
- Cost and energy efficiency
Data encryption and security should be done for secure
computing. This is generally done at the IP layer level using
IPsec or at DTLS (protocol layer).The files and folders that
are getting uploaded or downloaded to and from cloud should
be free from malware. Malware are set of instructions that run
on a computer and make it do something that an attacker wants
to do.
III. MALWARE DETECTION METHODS
One of the significant challenges within the development of
secure cloud is related to correct identification and detection
of malware. This is due to the reality that, within the majority
of cases, malware is the first factor of initiation for large
scale. Distributed Denial of Service (DDoS) attacks, phisphy
and email spamming etc. are some examples. There is huge
effort made to study about the behaviour of certain malware
in Internet. Generally they are termed as intrusion Detection
System (IDS). IDS are a system that alert when some suspi-
cious activity had generated in the network traffic. It scans a
network for any unusual activity. Sometimes false alarms can