International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

: Intrusion Detection and Prevention Systems (IDPS) are used: to identify possible attacks, collecting information about them and the trying to stop their occurrence and at last reporting them to the system administrator. These systems are used by some organizations to detect the weaknesses in their security policies, documenting existing attacks and threats and preventing an individual from violating security policies. Because of their advantages these systems became an important part of the security infrastructure in nearly every organization. In a Cloud computing environment, attackers can determine the vulnerabilities in the cloud systems and compromise the virtual machines to set out large scale Distributed Denial-of-Service (DDOS) attack. To avert these virtual machines from concession, we propose a multi-phase solution E-NICE (An Efficient Network Intrusion Detection and Countermeasure selection in Virtual Network Systems using defense in depth frame work).

Keywords: Network Security, Cloud Computing, Intrusion Detection, Attack Graph, Zombie Detection

Edition: Volume 3 Issue 8, August 2014

Pages: 1317 - 1328


How to Cite this Article?

Shaik Shanawaz, K. Thyagarajan, "An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015685, Volume 3 Issue 8, August 2014, 1317 - 1328

24 PDF Views | 22 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Network Security'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 964 - 968

Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique

Sajjade Zeba-Shazesh, Aruna K. Gupta

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this article



Similar Articles with Keyword 'Cloud Computing'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1949 - 1953

A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service

Pooja Saini, Kanchan Narula

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1681 - 1685

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Pranita Bakka, Dr. Jayashree Agarkhed

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this article



Similar Articles with Keyword 'Intrusion Detection'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1860 - 1864

An Improved Real Time Method for Detection, Blocking and Traceback of Malicious Traffic Over TOR

Rinaj Gafoor, Charlse M Varghese

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1496 - 1500

An Intrusion Detection Model for Detecting Type of Attack Using Data Mining

Amruta Surana, Shyam Gupta

Share this article



Similar Articles with Keyword 'Attack Graph'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2373 - 2377

A Review of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Trupti Dange, Pankaj Bhalerao

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2662 - 2666

Host Based Network Intrusion Detection System in Virtual Machine

Rupali Pravin Adhau, Saba Siraj

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1485 - 1487

NICE A: Implementation with Active Intrusion Detection System

Rasika R. Pawar, Mrunalinee Patole

Share this article



Similar Articles with Keyword 'Zombie Detection'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2373 - 2377

A Review of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Trupti Dange, Pankaj Bhalerao

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2662 - 2666

Host Based Network Intrusion Detection System in Virtual Machine

Rupali Pravin Adhau, Saba Siraj

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1485 - 1487

NICE A: Implementation with Active Intrusion Detection System

Rasika R. Pawar, Mrunalinee Patole

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this article
Top