International Journal of Computer Applications
The cloud computing system can be easily threatened by various attacks, because most of the cloud computing systems provide service to so many people who are not proven to be trustworthy. Due to their distributed nature, cloud computing environment are easy targets for intruders. There are various Intrusion Detection Systems (IDS) having various specifications to each. Cloud computing have two approaches i.e. knowledge-based IDS and behavior-based IDS to detect intrusions in cloud computing. Behavior-based IDS assumes that an intrusion can be detected by observing a deviation from normal to expected behavior of the system or users.