Proposing Intruder Tracing and Alert System (ITAS) an HIDS System for Cloud Computing
Cloud computing provides such an environment where service provider shares its computing resources among multiple clients and also manages the scalability of resources dynamically on the requirement. A cloud Data Center may have multiple Host Machines and each Host Machine may have multiple Virtual Machines, where the user’s processes execute. Security of cloud resources like software applications, database files, system files, root files, configuration files, and other files is very important when we are working in such a resources sharing environment. Because intruder may be a direct attacker or an indirect attacker i.e. may use a valid user as its agent for an attack to target our resources. In this paper, we will explore the different aspects of Intruder Detection System application and how it can be used for preventing our computing resources at the data center.