Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014
An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Shaik Shanawaz, K. Thyagarajan
: Intrusion Detection and Prevention Systems (IDPS) are used: to identify possible attacks, collecting information about them and the trying to stop their occurrence and at last reporting them to the system administrator. These systems are used by some organizations to detect the weaknesses in their security policies, documenting existing attacks and threats and preventing an individual from violating security policies. Because of their advantages these systems became an important part of the security infrastructure in nearly every organization. In a Cloud computing environment, attackers can determine the vulnerabilities in the cloud systems and compromise the virtual machines to set out large scale Distributed Denial-of-Service (DDOS) attack. To avert these virtual machines from concession, we propose a multi-phase solution E-NICE (An Efficient Network Intrusion Detection and Countermeasure selection in Virtual Network Systems using defense in depth frame work).
Keywords: Network Security, Cloud Computing, Intrusion Detection, Attack Graph, Zombie Detection
Edition: Volume 3 Issue 8, August 2014
Pages: 1317 - 1328
How to Cite this Article?
Shaik Shanawaz, K. Thyagarajan, "An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015685, Volume 3 Issue 8, August 2014, 1317 - 1328
109 PDF Views | 79 PDF Downloads
Similar Articles with Keyword 'Network Security'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1689 - 1692ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems
Vinod Kumar, Syeda Asra, Yallappa Meti
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1317 - 1328An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Shaik Shanawaz, K. Thyagarajan
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2535 - 2538A Survey on Security Mechanism using Colors and Armstrong Numbers
Nutan Gurav, Pratap Singh
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1303 - 1306Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1982 - 1985Review: Firewall Privacy Preservation By Packet Filtering Management
Akshay Dattatray Kachare, Geeta Atkar
Similar Articles with Keyword 'Cloud Computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Similar Articles with Keyword 'Intrusion Detection'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2085 - 2089Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1689 - 1692ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems
Vinod Kumar, Syeda Asra, Yallappa Meti
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1758 - 1764Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network
T. Sankar, M. Prakash
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1317 - 1328An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Shaik Shanawaz, K. Thyagarajan
Similar Articles with Keyword 'Attack Graph'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1689 - 1692ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems
Vinod Kumar, Syeda Asra, Yallappa Meti
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1317 - 1328An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Shaik Shanawaz, K. Thyagarajan
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2662 - 2666Host Based Network Intrusion Detection System in Virtual Machine
Rupali Pravin Adhau, Saba Siraj
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 511 - 516Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset
Swapnali G. Game, S. B. Natikar
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1209 - 1212NICE-D: A Modified Approach for Cloud Security
Nikita T. Ramteke, Dr. Yashwant V. Chavan
Similar Articles with Keyword 'Zombie Detection'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1689 - 1692ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems
Vinod Kumar, Syeda Asra, Yallappa Meti
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1317 - 1328An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Shaik Shanawaz, K. Thyagarajan
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1368 - 1371Spam and Zombie Detection System with Machine Learned Spot Algorithm
Manishankar.S, Sobin E. S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2662 - 2666Host Based Network Intrusion Detection System in Virtual Machine
Rupali Pravin Adhau, Saba Siraj
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2373 - 2377A Review of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Trupti Dange, Pankaj Bhalerao