Downloads: 110 | Views: 336
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.1 / 10
Host Based Network Intrusion Detection System in Virtual Machine
Rupali Pravin Adhau, Saba Siraj
Abstract: Cloud computing gaining popularity in the recent era. In past few year security is the main issue in the cloud computing. Intrusion Detection and Prevention Systems (IDPS) is mainly used: to identify possible attacks, collect all information about that attack and finally give this information to the system administrator. The IDS is used to detect the security level in many organization. In a Cloud computing, attackers can find the vulnerabilities in the cloud systems and compromise the virtual machines to set out large scale Distributed Denial-of-Service (DDOS) attack. This is very difficult to avoid this attack in the cloud computing environment. To prevent vulnerable virtual machines from being compromised in the cloud computing, I have proposed a multi-phase distributed vulnerability detection, measurement, and countermeasure (NICE). (Network Intrusion Detection and Countermeasure selection in Virtual Network Systems).
Keywords: Network Security, Cloud Computing, Intrusion Detection, Attack Graph, Zombie Detection, Denial of service
Edition: Volume 3 Issue 12, December 2014
Pages: 2662 - 2666
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Downloads: 138 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 5, May 2023
Pages: 273 - 278Genetic based Task Scheduling Algorithms in Cloud Computing Environment
Dr. R. Kavitha, Kale Jyoti S.
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023
Pages: 2966 - 2970Security in Kubernetes: A Comprehensive Review of Best Practices
Dinesh Reddy Chittibala