International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014


Host Based Network Intrusion Detection System in Virtual Machine

Rupali Pravin Adhau | Saba Siraj [2]


Abstract: Cloud computing gaining popularity in the recent era. In past few year security is the main issue in the cloud computing. Intrusion Detection and Prevention Systems (IDPS) is mainly used: to identify possible attacks, collect all information about that attack and finally give this information to the system administrator. The IDS is used to detect the security level in many organization. In a Cloud computing, attackers can find the vulnerabilities in the cloud systems and compromise the virtual machines to set out large scale Distributed Denial-of-Service (DDOS) attack. This is very difficult to avoid this attack in the cloud computing environment. To prevent vulnerable virtual machines from being compromised in the cloud computing, I have proposed a multi-phase distributed vulnerability detection, measurement, and countermeasure (NICE). (Network Intrusion Detection and Countermeasure selection in Virtual Network Systems).


Keywords: Network Security, Cloud Computing, Intrusion Detection, Attack Graph, Zombie Detection, Denial of service


Edition: Volume 3 Issue 12, December 2014,


Pages: 2662 - 2666


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Rupali Pravin Adhau, Saba Siraj, "Host Based Network Intrusion Detection System in Virtual Machine", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 2662-2666, https://www.ijsr.net/get_abstract.php?paper_id=SUB141150

Similar Articles with Keyword 'Network Security'

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey [9]

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 9, September 2024

Pages: 1020 - 1022

Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix

Tahir Bashir [2]

Share this Article
Top