International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 124

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014


Host Based Intrusion Detection to Prevent Virtual Network System from Intruders in Cloud

J. Sasi Devi | R. Sugumar [3]


Abstract: In Cloud System, virtual machine is considered as the security threat. This is because all cloud users install their applications in virtual machines. Particularly, intruders can exploit vulnerability to a cloud system and compromise virtual machines to deploy further large scale types of attack like distributed denial of service (DDOS). Mainly vulnerability arises in infrastructure as a service (laas) cloud where the infrastructure shared by millions of users. To prevent vulnerable virtual machine from being compromised in the cloud, the proposed framework introducing multiphase distributed vulnerability detection measurement and countermeasure selection mechanism. It built an attack graph analytical model which is used for identify the intruders possible way of exploit vulnerability. The model consist information about virtual topology and also about cloud servers. Based on the information provided by the analytical model then the system deploy an appropriate counter measures.


Keywords: Cloud Server, DDOS, Intruders, Virtual machine, Vulnerability


Edition: Volume 3 Issue 3, March 2014,


Pages: 373 - 376


How to Cite this Article?

J. Sasi Devi, R. Sugumar, "Host Based Intrusion Detection to Prevent Virtual Network System from Intruders in Cloud", International Journal of Science and Research (IJSR), Volume 3 Issue 3, March 2014, pp. 373-376, https://www.ijsr.net/get_abstract.php?paper_id=20131152

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Cloud Server'

Downloads: 100

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A. [2] | Neethu Francis [2]

Share this Article


Top