are used to launch a specific attack with the aim 
of denying the normal service or degrading the 
quality of services. One of the reasons why the 
DoS attacks are very threatening is the automated 
tool. Because of using the automated attack 
process, if once the attacker finds the systems 
with weak security, it does not take above 5 
seconds to install the tool and attack the victim. 
And it takes thousands of hosts only one minute 
to be invaded (S. Khan and Z. Farooqui, 2016) 
(Saadia Ghribi, 2016). 
3.1.2  Data Breaches Attacks 
In the case of a poorly designed multitenant Cloud 
service database, a flaw in one client’s application 
could allow an attacker access the data of that client 
and all other clients. In 2012, researchers introduced 
a side-channel attack by which one Virtual Machine 
(VM) can extract private cryptographic keys on the 
same physical machine. Mitigation of this threat is not 
a simple task. One way of eliminating data breaches 
is to encrypt all of the client’s data. However, if the 
encryption key is lost, the client would have a 
complete data loss. Thus, the client would need to 
have a backup copy of the data, somewhere else, or 
even offline backup. The client should keep in mind 
that having more copies of the data would potentially 
increase the probability of data breaches. (M. M. 
Alani, 2014) 
3.1.3  Cloud Malware Injection 
It is the first considerable attack attempt that inject 
implementation of a malicious service or virtual 
machine into the Cloud. The purpose of malware cloud 
is anything that the adversary is interested in, it may 
include data modifications, full functionality 
changes/reverse or blockings. In this attack adversary 
creates its own malicious service implementation 
module (SaaS or PaaS) or virtual machine instance 
(IaaS), and add it to the Cloud system. Then, the 
adversary has to pretend to the Cloud system that it is 
some the new service implementation instance and 
among the valid instances for some particular service 
attacked by the adversary. If this action succeeds, the 
Cloud automatically redirects the requests of valid user 
to the malicious service implementation, and the 
adversary’s code is executed. (Y. Wang and C. Wang, 
2015) 
3.1.4  Side Channel Attacks 
Associate degree assaulter may decide to compromise 
the cloud by inserting a malicious virtual machine in 
shut proximity to a target cloud server then launching 
an aspect channel attack.  In a side-channel attack, the 
attacker gains information about the cryptographic 
technique used by analyzing physical characteristics 
of the cryptosystem implementation. In Cloud 
Computing, side-channels attacks are conducted 
through gaining access to the physical node hosting 
the target VM. This access can be available through 
creating a VM in the same physical node that is 
hosting the target VM. The attacker can keep creating 
VMs in the Cloud until one VM is created in the same 
physical node of the target VM. Afterwards, the 
attacker can start collecting information necessary to 
conduct the attack. An attacker  attempts to 
compromise the Cloud system by placing a malicious 
virtual machine in close propinquity to a target Cloud 
server system and then debut a side channel attack. 
(S. Khan and Z. Farooqui, 2016) 
3.1.5 Authentication Attacks 
Authentication could be a liability in hosted and 
virtual services and is often targeted. There square 
measure many alternative ways that to manifest users. 
For example, supported what someone is aware of, 
has, or is. The mechanisms wont to secure the 
authentication method and also the ways used square 
measure a frequent target of attackers. Currently, 
concerning the design of SaaS, IaaS and PaaS, there's 
solely IaaS giving this sort of data protection and 
encryption. 
These categories of security attacks can affect 
specific cloud layer and compromise it. We note also 
that all these mentioned attacks are considered as 
distributed attacks. (S. Khan and Z. Farooqui, 2016) 
3.2  Objectives of the Proposed 
Approach 
The proposed solution aims basically to reduce the 
impact of several types of attacks in the cloud 
Computing. The architecture proposed in our work 
includes two types of Intrusion Detection System 
(IDS) placed at different Cloud model (IaaS or SaaS), 
a correlative algorithm and Manager. The objectives 
of this approach are grouped as follows: 
  Intrusion detection on IaaS and SaaS layers. We 
use IaaS Based IDS (I-IDS) at IaaS layer to 
collect and detect attacks specific to this layers 
from all the attacked VM. In case of attack, I-IDS 
updates its signature database and sends a 
security alert including all information about the 
attack to S-IDS located on the same physical 
node.