dc.description.abstract |
Cloud Computing is a diversified field which enables commodious and convenient sharing of computing resources including storage, processing, networks, servers, applications and services over the internet. The hassle-free utilization of cloud computing from around the globe at any time without the involvement of own resources makes it very attractive to the users and the main reason for its widespread application. However, with all the benefits, cloud environment is prone to many security concerns. Network intrusion is one such obstruction which raises concerns as it could affect confidentiality and integrity of data besides disrupting availability of services. Virtual Machines are a key component of cloud computing model. The security of these VMs is of paramount importance as their appearance is invisible but utility is ineluctable. In this research, I have made an endeavor to use anomaly based intrusion detection methodology to identify events and observe incidents which do not comply with expected legitimate patterns of network usage in a cloud environment utilizing VMs. The proposed solution observes the VM traffic, detect anomalous behavior and restrain the network system through filtered influx. |
en_US |