Host Based Intrusion Detection to Prevent Virtual Network System from Intruders in Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 292

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014 | Popularity: 6.3 / 10


     

Host Based Intrusion Detection to Prevent Virtual Network System from Intruders in Cloud

J. Sasi Devi, R. Sugumar


Abstract: In Cloud System, virtual machine is considered as the security threat. This is because all cloud users install their applications in virtual machines. Particularly, intruders can exploit vulnerability to a cloud system and compromise virtual machines to deploy further large scale types of attack like distributed denial of service (DDOS). Mainly vulnerability arises in infrastructure as a service (laas) cloud where the infrastructure shared by millions of users. To prevent vulnerable virtual machine from being compromised in the cloud, the proposed framework introducing multiphase distributed vulnerability detection measurement and countermeasure selection mechanism. It built an attack graph analytical model which is used for identify the intruders possible way of exploit vulnerability. The model consist information about virtual topology and also about cloud servers. Based on the information provided by the analytical model then the system deploy an appropriate counter measures.


Keywords: Cloud Server, DDOS, Intruders, Virtual machine, Vulnerability


Edition: Volume 3 Issue 3, March 2014


Pages: 373 - 376



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
J. Sasi Devi, R. Sugumar, "Host Based Intrusion Detection to Prevent Virtual Network System from Intruders in Cloud", International Journal of Science and Research (IJSR), Volume 3 Issue 3, March 2014, pp. 373-376, https://www.ijsr.net/getabstract.php?paperid=20131152, DOI: https://www.doi.org/10.21275/20131152

Similar Articles

Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 5 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 1755 - 1759

Enhancement in Homomorphic Encryption Scheme of Cloud Computing to Isolate DOS Attack

Jaspreet Kaur, Dr. Gurjit Singh Bhathal

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 6, June 2024

Pages: 1356 - 1362

Deploying Own Private Cloud

Divyamsh Reddy A, CB Manogna Reddy

Share this Article

Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Downloads: 97

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1690 - 1694

Analytics of Application Resource Utilization within the Virtual Machine

Priyanka H

Share this Article
Top