Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Enhancement of Cloud Security Using Snort


Affiliations
1 GTU - Graduate School of Engineering & Technology, Gandhinagar, Gujarat, India
2 Bhaskaracharya Institute for Space Applications and Geo-Informatics, Gandhinagar, Gujarat, India
     

   Subscribe/Renew Journal


Cloud computing is a paradigm that enables access to a shared pool of computing resources for cloud users in an on-demand and pay-per-use, fashion. Despite the existence of such merits, there are Security issues such as data integrity, users’ confidentiality, and service availability because of its open and distributed architecture that place restrictions on the usage of cloud computing. A preventive approach is to identify such issues and eliminate before it can cause the serious impact to the cloud users. Intrusion Detection System (IDS) is the most commonly used mechanism to detect attacks on cloud. In this paper snort IDS method is used in cloud environment to detect intrusions. Next step is enforcing snort intrusion detection system in cloud environment and new policies within the snort to improving the extent of security within the cloud environment and studying the snort log report, to see that it nicely alert the message in log record. So that administrator can take similarly protection selections associated with attacks.

Keywords

Cloud Security, Intrusion Detection System, Snort.
Subscription Login to verify subscription
User
Notifications
Font Size



  • Enhancement of Cloud Security Using Snort

Abstract Views: 394  |  PDF Views: 0

Authors

Nidhi Thakkar
GTU - Graduate School of Engineering & Technology, Gandhinagar, Gujarat, India
Miren Karamta
Bhaskaracharya Institute for Space Applications and Geo-Informatics, Gandhinagar, Gujarat, India
Seema Joshi
GTU - Graduate School of Engineering & Technology, Gandhinagar, Gujarat, India
M. B. Potdar
Bhaskaracharya Institute for Space Applications and Geo-Informatics, Gandhinagar, Gujarat, India

Abstract


Cloud computing is a paradigm that enables access to a shared pool of computing resources for cloud users in an on-demand and pay-per-use, fashion. Despite the existence of such merits, there are Security issues such as data integrity, users’ confidentiality, and service availability because of its open and distributed architecture that place restrictions on the usage of cloud computing. A preventive approach is to identify such issues and eliminate before it can cause the serious impact to the cloud users. Intrusion Detection System (IDS) is the most commonly used mechanism to detect attacks on cloud. In this paper snort IDS method is used in cloud environment to detect intrusions. Next step is enforcing snort intrusion detection system in cloud environment and new policies within the snort to improving the extent of security within the cloud environment and studying the snort log report, to see that it nicely alert the message in log record. So that administrator can take similarly protection selections associated with attacks.

Keywords


Cloud Security, Intrusion Detection System, Snort.

References