Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Intrusion Detection and Prevention System for Cloud Simulation Environment using Hidden Markov Model and MD5

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 19
Year of Publication: 2014
Harsha Banafar
Sanjay Sharma

Harsha Banafar and Sanjay Sharma. Article: Intrusion Detection and Prevention System for Cloud Simulation Environment using Hidden Markov Model and MD5. International Journal of Computer Applications 90(19):6-11, March 2014. Full text available. BibTeX

	author = {Harsha Banafar and Sanjay Sharma},
	title = {Article: Intrusion Detection and Prevention System for Cloud Simulation Environment using Hidden Markov Model and MD5},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {90},
	number = {19},
	pages = {6-11},
	month = {March},
	note = {Full text available}


Any activity aimed at disrupting a service or making a resource unavailable or gaining unauthorized access can be termed as an intrusion. Intrusion detection systems (IDSs) play a key role in detecting such malicious activities and enable administrators in securing network systems. The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper we have proposed new security architecture for cloud computing platform. This ensures secure communication system and hiding information from others by authentication using shared secret key MD5 and provides security using Hidden Markov Model. This structure can be easily applied with main cloud computing features, e. g. PaaS, SaaS and IaaS. Our work mainly deals with the security system of the whole cloud computing platform.


  • Kawser Wazed Nafi , Tonny Shekha Kar, Sayed Anisul Hoque, Dr. M. M. A Hashem "A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture" (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2012.
  • R Rangadurai Karthick,Vipul P. Hattiwale, Balaraman Ravindran "Adaptive Network Intrusion Detection System using a Hybrid Approach" 978-1-4673-0298-2/12/$31. 00 c 2012 IEEE.
  • Siva S. Sivatha Sindhu , S. Geetha , A. Kannan "Decision tree based light weight intrusion detection using a wrapper approach" Expert Systems with Applications 39 (2012) journal homepsage: www. elsevier. com/locate/eswa.
  • Sung-Bae Cho and Hyuk-Jang Park "Efficient anomaly detection by modeling privilege flows using hidden Markov model" Computers & Security Vol 22, No 1, pp 45-55, 2003
  • Dinesha H Aand Dr. V. K Agrawal "MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES" International Journal on Cloud Computing: Services and Architecture(IJCCSA),Vol. 2, No. 3, June 2012.
  • Md Kausar Alam, Sharmila Banu K "An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds"International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 ISSN 2250-3153 www. ijsrp. org .
  • Mohit Marwaha, Rajeev Bedi "Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing"IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013 ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814 www. IJCSI. org.
  • Richa Sondhiya, Maneesh Shreevastav, Mahendra Mishra "To Improve Security in Cloud Computing with Intrusion detection system using Neural Network" International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-2, May 2013.
  • Ms. Asha. D and R. Chitra "Securing cloud from ddos attacks using intrusion detection system in virtual machine" IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320 - 8791
  • Kashif Munir and Sellapan Palaniappan "Security Threats/Attacks Present in Cloud Environment".
  • Flavio Lombardi, Roberto Di Pietro "Secure virtualization for cloud computing" Journal of Network and Computer Applications 34 (2011) 1113–1122.
  • Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande "Intrusion Detection System for Cloud Computing" International Journal of Scientific & Technology Research Volume 1, Issue 4, May 2012 ISSN 2277-8616 67 IJSTR©2012
  • Yizhang Guan, Jianghong Bao "A CP Intrusion Detection Strategy on Cloud Computing" ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA'09).
  • Aerohive Network white paper "The Benefits of Cloud Networking" Enable cloud networking to lower IT costs & boost IT productivity
  • Veselina Jecheva "About Some Applications of Hidden Markov Model in Intrusion Detection Systems" International Conference on Computer Systems and Technologies - CompSysTech'06
  • Issa M. Khalil , Abdallah Khreishah and Muhammad Azeem "Cloud Computing Security: A Survey" Computers2014,3,1-35; doi:10. 3390/computers3010001 computers ISSN 2073-431X www. mdpi. com/journal/computers
  • Andre Arnes, Fredrik Valeur, Giovanni Vigna, and Richard A. Kemmerer "Using Hidden Markov Models to Evaluate the Risks of Intrusions" System Architecture and Model Validation.
  • Nong Ye "A Markov Chain Model of Temporal Behavior for Anomaly Detection" Proceedings of the 2000 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 6-7 June, 2000 $10. 00 © 2000 IEEE 171.