A Relevance Technical Approach for Screening the Significance of IDS in Cloud Forensics
Shaik Khaja Mohiddin1, Yalavarthi Suresh Babu2

1Shaik Khaja Mohiddin, Research Scholar, Department of Computer Science Engineering, Acharya Nagarjuna University, Guntur, Andhra Pradesh, India.

2Dr. Yalavarthi Suresh Babu, Professor, Department of Computer Science Engineering, Acharya Nagarjuna University, Guntur, Andhra Pradesh, India.

Manuscript received on 05 March 2019 | Revised Manuscript received on 12 March 2019 | Manuscript Published on 20 March 2019 | PP: 425-430 | Volume-8 Issue- 4S2 March 2019 | Retrieval Number: D1S0093028419/2019©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Due to an exponential growth of technology with huge and huge amount of data which is generated and has to be processed and this data is not related to a single area which is related to multiple areas and also this raises the need for the storage of data, which emphasizes the importance of cloud, now every small industry or small organizations has moved maximum towards cloud. Storage of data in cloud has many advantages including which has accessing the data with respect to any place, with respect to any device with a minimal internet connection beside this there is a downfall with respect to the intruders who are considered as the major threat for the data stored in the cloud. The importance which is given for storage of data in the cloud the same has to be implemented for protection of data inside the cloud, well which sometimes failed to be achieved this stresses for the need of Intrusion Detection System. An Intrusion Detection System (IDS) also plays an important role during the process of Cloud Forensics. In This paper we have traced out the importance of IDS in Cloud Forensics by using a snort IDS which is an open source we have gone with the process of using snort by tuning the rules in snort according to our requirements. Where the intrusion activities are being sniffed by the IDS which are then detected by the Forensic Analysis tools and then they are being analysed during the forensic process.

Keywords: DS: Intrusion Detection System, IPS: Intrusion Protection System, CF: Cloud Forensics, SLA: Service Level Agreement, CSP: Cloud Service Provider.
Scope of the Article: Computer Science and Its Applications