The proposed model is only theoretical currently. A system
that will be consistent with the model described in the paper
will be developed in future. The system will try to detect all
possible threats and may use a combination of signature based
as well as learning based methods. The system will be built
using Eucalyptus cloud architecture.
The detection techniques described above are just a subset of
the actual list of techniques which can be used to detect
intrusions. Intrusions in a cloud may modify low level
parameters of the system, such as its file management, process
management techniques etc. These modifications, if fully