Abstract of ISRV: Intrusion Dete, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015


ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar [39] | Syeda Asra | Yallappa Meti


Abstract: A considerable lot of the computer infrastructure are progressively vulnerable to attacks (assaults), since intrusion detection is essential however shockingly deficient. So we have to design and implement a powerful detection and reaction techniques to bypass intrusions when they are detected. This intrusion and detection strategy is in view of distinctive sorts of counter-measures. The principle thought is to design and develop a decision support tool to help the administrator to pick the suitable counter-measure when an intrusion is detected. Cloud computing is another developing strategy in computer oriented services. This framework have some distributed system, as per these likenesses of cloud computing additionally utilizes the components of virtual networking environment. And it provides the Data recovery of the Cloud Server when attacker attacks the Cloud, here it uses the basic data recovery algorithm by taking the backup of Cloud Server.


Keywords: Network security, cloud computing, intrusion detection, attack graph, zombie detection, Data recovery


Edition: Volume 4 Issue 7, July 2015,


Pages: 1689 - 1692


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Vinod Kumar, Syeda Asra, Yallappa Meti, "ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems", International Journal of Science and Research (IJSR), Volume 4 Issue 7, July 2015, pp. 1689-1692, https://www.ijsr.net/get_abstract.php?paper_id=SUB156746

Similar Articles with Keyword 'Network security'

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 779 - 789

Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure

Surbhi Batra | Chandra Sekhar Dash

Share this Article

Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5

Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024

Pages: 1927 - 1929

Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix

Tahir Bashir [2]

Share this Article
Top