Proposing Intruder Tracing and Alert System (ITAS) an HIDS System for Cloud Computing

  • Fayaz Ahmad Lone, Aaqib Rashid and Dr. Amit Kr. Chaturvedi

Abstract

Cloud computing provides such an environment where service provider shares its computing resources among multiple clients and also manages the scalability of resources dynamically on the requirement. A cloud Data Center may have multiple Host Machines and each Host Machine may have multiple Virtual Machines, where the user’s processes execute. Security of cloud resources like software applications, database files, system files, root files, configuration files, and other files is very important when we are working in such a resources sharing environment. Because intruder may be a direct attacker or an indirect attacker i.e. may use a valid user as its agent for an attack to target our resources. In this paper, we will explore the different aspects of Intruder Detection System application and how it can be used for preventing our computing resources at the data center.

Published
2020-05-15
How to Cite
Fayaz Ahmad Lone, Aaqib Rashid and Dr. Amit Kr. Chaturvedi. (2020). Proposing Intruder Tracing and Alert System (ITAS) an HIDS System for Cloud Computing. International Journal of Advanced Science and Technology, 29(11s), 2896-2903. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/23778
Section
Articles