The cloud environment has been used for several purpose in modern information society. Like any other information system, the cloud environment also faces variety of threats. The intrusion attack is the most dominant entity which affect the service performance provided by the environment. The malicious users are capable of generating intrusion attacks which degrade the service performance and the entire system. It is necessary to safeguard the services provided by the environment and needs to monitor the user request generated. To perform this, different approaches are available which are prescribed by various researchers. This paper analyzes various methods of intrusion detection applicable for the cloud environment. Also, the methods are compared for their performance and facts.
Volume 12 | Issue 4