ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 7)Publication Date: 2015-07-05
Authors : Vinod Kumar; Syeda Asra; Yallappa Meti;
Page : 1689-1692
Keywords : Network security; cloud computing; intrusion detection; attack graph; zombie detection; Data recovery;
Abstract
A considerable lot of the computer infrastructure are progressively vulnerable to attacks (assaults), since intrusion detection is essential however shockingly deficient. So we have to design and implement a powerful detection and reaction techniques to bypass intrusions when they are detected. This intrusion and detection strategy is in view of distinctive sorts of counter-measures. The principle thought is to design and develop a decision support tool to help the administrator to pick the suitable counter-measure when an intrusion is detected. Cloud computing is another developing strategy in computer oriented services. This framework have some distributed system, as per these likenesses of cloud computing additionally utilizes the components of virtual networking environment. And it provides the Data recovery of the Cloud Server when attacker attacks the Cloud, here it uses the basic data recovery algorithm by taking the backup of Cloud Server.
Other Latest Articles
- Ovarian Fibroma in Young Female with Raised Serum Ca-125: A Unique Case Report
- A Study on Assessment of Thyroid Stimulating Hormone and Insulin Resistance in Women with Polycystic Ovarian Syndrome
- Delayed Presenting Scapular Osteochondroma as a Rare Cause of Supra-Clavicular Tumor Mass- A Case Report
- Performance Analysis of Routing Algorithms: AODV, DSDV, OLSR, DSR in WPAN
- Report of an Unusual Case of Primary Normo-phosphatemic Tumoral Calcinosis
Last modified: 2021-06-30 21:50:52