NICE A: Implementation with Active Intrusion Detection System
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 2)Publication Date: 2015-02-05
Authors : Rasika R. Pawar; Mrunalinee Patole;
Page : 1485-1487
Keywords : Network security; cloud computing; intrusion detection; attack graph; zombie detection;
Abstract
Intrusion Detection and Prevention Systems (IDPS) are used to identify possible attacks, collecting information about them and the trying to stop their occurrence and at last reporting them to the system administrator. These systems are used by some organizations to detect the weaknesses in their security policies, documenting existing attacks and threats and preventing an individual from violating security policies. Because of their advantages these systems became an important part of the security infrastructure in nearly every organization. In a Cloud computing environment, attackers can determine the vulnerabilities in the cloud systems and compromise the virtual machines to set out large scale Distributed Denial-of-Service (DDOS) attack. To avert these virtual machines from concession, we propose a multi-phase solution NICE (Network Intrusion Detection and Countermeasure selection in Virtual Network Systems).
Other Latest Articles
- Success Stories of KGBV Passed Out Girls in Andhra Pradesh
- Henrik Ibsen and Modern Drama
- Geotechnical Aspects for Roads on Expansive Soils
- A Comparative Study of Salmon Calcitonin and Zoledronic Acid in the Treatment of Osteoporosis
- Treatment of Supracondylar Fracture of Distal Femur with Condylar Locking Compression Plating
Last modified: 2021-06-30 21:22:46