Intrusion Detection System in Cloud Computing Environment

The cloud computing system can be easily threatened by various attacks, because most of the cloud computing systems provide service to so many people who are not proven to be trustworthy. Due to their distributed nature, cloud computing environment are easy targets for intruders. There are various Intrusion Detection Systems (IDS) having various specifications to each. Cloud computing have two approaches i.e. knowledge-based IDS and behavior-based IDS to detect intrusions in cloud computing. Behavior-based IDS assumes that an intrusion can be detected by observing a deviation from normal to expected behavior of the system or users.

Provided by: International Journal of Computer Applications Topic: Cloud Date Added: Aug 2012 Format: PDF

Find By Topic