Network access technologies, including Wi-Fi and 4G LTE, are becoming more and more popular in Cloud computing infrastructure due to their increased performance, reliabilities, and ease of development. Cloud consumers can collect and process real time and continuous sets of massive assets. The large data size and security concerns have resulted in an ever-increasing need for efficient paradigm concept to integrate the functionalities of data monitor, analysis and anomalous traffic behavior detection. The procedure of intercepting traffics assigned by Cloud consumers and passing through Cloud scheduler to the Cloud infrastructure data centers has been known as wireless packet sniffer. This could capture the entire packets and analyze the contents in both Private Cloud Network (PrCN) and Public Cloud Network (PuCN) in the RFMON (Radio Frequency MONitor) mode. After buffering the entire Cloud consumer’s images in the Cloud scheduler, further interpretation of the packets can be carried out to distinguish malicious from beneficial packets. We designed and developed an intrusion detection model, namely Cloud Snooping Disclosure (CSD) to monitor the Cloud consumer’s image traffic loads, detect the anomalous traffic behaviors, and block the malicious intrusion. Our heuristic is based on two major steps, Forward and Backward scanning process. The step includes the initialization process and installing the security parameters for both sides, Cloud users and Cloud scheduler, while the second one relates to capturing anomalous inter-VM traffics. Furthermore, our algorithm incorporates pcap library into Cloud scheduler so that any incongruous traffic behaviors can be reported and saved. Our system was inspired by some existing researches that applied sniffer software such as Ethereal, Tcpdump, and Snort. The simulation results indicate that the effectiveness of our heuristic had the ability to detect and eliminate approximately 107 anomalous traffic behaviors from five case trials that have been generated by CloudSim framework.