Host Based Network Intrusion Detection System in Virtual Machine
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110 | Views: 336

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.1 / 10


     

Host Based Network Intrusion Detection System in Virtual Machine

Rupali Pravin Adhau, Saba Siraj


Abstract: Cloud computing gaining popularity in the recent era. In past few year security is the main issue in the cloud computing. Intrusion Detection and Prevention Systems (IDPS) is mainly used: to identify possible attacks, collect all information about that attack and finally give this information to the system administrator. The IDS is used to detect the security level in many organization. In a Cloud computing, attackers can find the vulnerabilities in the cloud systems and compromise the virtual machines to set out large scale Distributed Denial-of-Service (DDOS) attack. This is very difficult to avoid this attack in the cloud computing environment. To prevent vulnerable virtual machines from being compromised in the cloud computing, I have proposed a multi-phase distributed vulnerability detection, measurement, and countermeasure (NICE). (Network Intrusion Detection and Countermeasure selection in Virtual Network Systems).


Keywords: Network Security, Cloud Computing, Intrusion Detection, Attack Graph, Zombie Detection, Denial of service


Edition: Volume 3 Issue 12, December 2014


Pages: 2662 - 2666



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Rupali Pravin Adhau, Saba Siraj, "Host Based Network Intrusion Detection System in Virtual Machine", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 2662-2666, https://www.ijsr.net/getabstract.php?paperid=SUB141150, DOI: https://www.doi.org/10.21275/SUB141150

Similar Articles

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 138 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 5, May 2023

Pages: 273 - 278

Genetic based Task Scheduling Algorithms in Cloud Computing Environment

Dr. R. Kavitha, Kale Jyoti S.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023

Pages: 2966 - 2970

Security in Kubernetes: A Comprehensive Review of Best Practices

Dinesh Reddy Chittibala

Share this Article
Top