International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 113

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015


NICE A: Implementation with Active Intrusion Detection System

Rasika R. Pawar | Mrunalinee Patole [4]


Abstract: Intrusion Detection and Prevention Systems (IDPS) are used to identify possible attacks, collecting information about them and the trying to stop their occurrence and at last reporting them to the system administrator. These systems are used by some organizations to detect the weaknesses in their security policies, documenting existing attacks and threats and preventing an individual from violating security policies. Because of their advantages these systems became an important part of the security infrastructure in nearly every organization. In a Cloud computing environment, attackers can determine the vulnerabilities in the cloud systems and compromise the virtual machines to set out large scale Distributed Denial-of-Service (DDOS) attack. To avert these virtual machines from concession, we propose a multi-phase solution NICE (Network Intrusion Detection and Countermeasure selection in Virtual Network Systems).


Keywords: Network security, cloud computing, intrusion detection, attack graph, zombie detection


Edition: Volume 4 Issue 2, February 2015,


Pages: 1485 - 1487


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Rasika R. Pawar, Mrunalinee Patole, "NICE A: Implementation with Active Intrusion Detection System", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 1485-1487, https://www.ijsr.net/get_abstract.php?paper_id=SUB15360



Similar Articles with Keyword 'Network security'

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey [9]

Share this Article

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 779 - 789

Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure

Surbhi Batra | Chandra Sekhar Dash

Share this Article



Top