International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 114

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014


An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz | K. Thyagarajan


Abstract: : Intrusion Detection and Prevention Systems (IDPS) are used: to identify possible attacks, collecting information about them and the trying to stop their occurrence and at last reporting them to the system administrator. These systems are used by some organizations to detect the weaknesses in their security policies, documenting existing attacks and threats and preventing an individual from violating security policies. Because of their advantages these systems became an important part of the security infrastructure in nearly every organization. In a Cloud computing environment, attackers can determine the vulnerabilities in the cloud systems and compromise the virtual machines to set out large scale Distributed Denial-of-Service (DDOS) attack. To avert these virtual machines from concession, we propose a multi-phase solution E-NICE (An Efficient Network Intrusion Detection and Countermeasure selection in Virtual Network Systems using defense in depth frame work).


Keywords: Network Security, Cloud Computing, Intrusion Detection, Attack Graph, Zombie Detection


Edition: Volume 3 Issue 8, August 2014,


Pages: 1317 - 1328


How to Cite this Article?

Shaik Shanawaz, K. Thyagarajan, "An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems", International Journal of Science and Research (IJSR), Volume 3 Issue 8, August 2014, pp. 1317-1328, https://www.ijsr.net/get_abstract.php?paper_id=2015685

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Network Security'

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V | Sandhya V [4]

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016

Pages: 1112 - 1116

Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad

Share this Article


Top