Article Preview
TopIntroduction
Recently, the cloud computing is defined as the novel paradigm where the services are either to be hosted or delivered over the Internet world, hence, it is also termed as the Internet computing. In other words, the term cloud computing is the process of computing service over the Internet world. In cloud computing, it poses the resource provider where the user utilizes the resources anywhere, anytime and also anything (Rajendran, Muthukumar, & Nagarajan, 2015). The rapid development of cloud computing is caused by the location independent of information processing. Furthermore, the trust or security is considered as the main aspect among the cloud users in the cloud computing services. Hence, Cloud security becomes the challenging task for the users utilize the cloud resources and also successfully exploitation of its respective services (Deshpande, Sharma, Peddoju, & Junaid, 2014). There are three services provided in the cloud computing, which are software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). The intrusion or malicious activity or attacks are the major drawbacks of the cloud services. Thus, require to enhancing the security and trusting management through intrusion detection system. Some of the common available attacks in the cloud computing are DNS poisoning, port scanning, man-in-the-middle attack, IP spoofing, etc. (Modi, Dhiren R. Patel, Avi Patel, and Rajarajan 2012). The attacks in the cloud computing are categorized into two ways, insider attack and outsider attack.
The attacker’s attacks the network from the external source of origin is termed as external attack. On the contrary in insider attacks, unauthorized internal users are involved in the cloud services to abuse the access privileges. In order to detect the attack or malicious node in the network, an intrusion detection system (IDS) is employed. This system is used to detect the intrusions assist by computerizing the intrusion detection scheme. In other words, the intrusion detection is the process of monitoring computers or networks to detect an unauthorized entry, file and activity modification (Patel, Taghavi, Bakhtiyari, & Junior, 2013). The basic concept of intrusion detection system is to collect the network traffic, analyzes the traffic, and makes response or alerts the network when an intrusion detects in the network. Therefore, the aim of the IDS is to alert or notify the system if some malicious activities take place by such intruders (Krishnan & Chatterjee, 2012). Some of the key factors of intrusion detection systems are fast, critical to fraudulent users, ease of configuration, self-monitored, available without interruption, fault tolerant and free from false errors leads to possibility of minimum overhead. Then, the information system is evaluated which has the tendency to detect the activities of malicious node or any intruder in the network. Thus, the security level should be enhanced by performing the intrusion detection system (Raja & Ramaiah, 2016).