Intrusion Detection in a Cloud Environment
Cloud computing is an emerging computing paradigm aimed at providing IT (information technology) services in a similar manner as the electricity grid. In Cloud computing, computing resources, data and software are managed by service providers on the Internet, and are provided to users and their devices in an on-demand manner. This new paradigm offers a number of advantages including on-demand self-service, ubiquitous and broad network access, resource pooling, rapid resource elasticity and usage-based pricing. While this paradigm is attractive to users in many aspects, it also introduces many serious concerns.
In this project, you will have an opportunity to investigate major avenues to security attacks or violations and research and design effective and efficient methods to detect the attacks and violations in a cloud computing environment.