Abstract

Security issues in cloud computing have increasingly become important issue with the growing popularity of cloud computing as it provides buyers accessibility and reliability services. Security in cloud computing are classified into two types, namely data security and network security. Our paper focus on network security issue. The types of attacks that are common in network security are ports scan, IP spoofing, ping of death, and packet sniffing. The possibility attacks can occur from both inside and outside of the cloud computing infrastructure. Several studies have shown that Intrusion Detection System (IDS) is the best solution for the detection of the attack. A key success factor for attack detection is IDS server placement. IDS can be placed separately from the server cloud, or placed in a cloud server. IDS placement in the server cloud and separate placement of cloud server has a major influence on the CPU and RAM usage on the cloud server. In this paper, we will present IDS server placement scenario for the successful detection and evaluate performance memory and CPU usage. We propose three types of placement IDS server. First, we place the IDS server inside the cloud server, the other scenario we place the IDS server separate from the cloud server, and the last we place IDS server both inside and separate cloud server. Each scenarios will be tested by the attacks from within and from outside cloud server. Within this paper we summarize that IDS server placement IDS depends on the major attacks.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.