Enhancement of Cloud Security Using Snort
Published: 2019
Author(s) Name: Nidhi Thakkar, Miren Karamta, Seema Joshi and M. B. Potdar |
Author(s) Affiliation: M.E. Student, GTU - Graduate School of Engineering & Technology, Gandhinagar, Gujarat, India.
Locked
Subscribed
Available for All
Abstract
Cloud computing is a paradigm that enables access to a shared pool of computing resources for cloud users in an on-demand and pay-per-use, fashion. Despite the existence of such merits, there are Security issues such as data integrity, users’ confidentiality, and service availability because of its open and distributed architecture that place restrictions on the usage of cloud computing. A preventive approach is to identify such issues and eliminate before it can cause the serious impact to the cloud users. Intrusion Detection System (IDS) is the most commonly used mechanism to detect attacks on cloud. In this paper snort IDS method is used in cloud environment to detect intrusions. Next step is enforcing snort intrusion detection system in cloud environment and new policies within the snort to improving the extent of security within the cloud environment and studying the snort log report, to see that it nicely alert the message in log record. So that administrator can take similarly protection selections associated with attacks.
Keywords: Cloud security, Intrusion detection system, Snort.
View PDF