Downloads: 110 | Views: 260
Review Papers | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.3 / 10
A Review of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Trupti Dange, Pankaj Bhalerao
Abstract: Nowadays every industry and even some parts of the public sector are using cloud computing, either as a provider or as a consumer. But there are many security issues present in cloud computing environment. There are many possible attacks in cloud computing environment, One such attack is the DoS or its version DDoS attack. Generally, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such as low frequency vulnerability scanning, multi-step exploitation and compromising identified vulnerable virtual machines as zombies and finally DDoS attacks using the compromised zombies. Inside the cloud system, especially the Infrastructure-as-a-Service clouds, the detection of zombie exploration attacks is very difficult. To prevent vulnerable virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, which is built on attack graph based systematic models and reconfigurable virtual network-based countermeasures. This paper provides a short Reveiw on the techniques to network intrusion detection and countermeasure selection in virtual network system.
Keywords: Intrusion Detection, Network Security, Cloud Computing, Attack Graph, Zombie Detection
Edition: Volume 3 Issue 11, November 2014
Pages: 2373 - 2377
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 779 - 789Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure
Surbhi Batra, Chandra Sekhar Dash
Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024
Pages: 1927 - 1929Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix
Tahir Bashir
Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024
Pages: 882 - 886Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation
Manupreet Kaur
Downloads: 103
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1368 - 1371Spam and Zombie Detection System with Machine Learned Spot Algorithm
Manishankar.S, Sobin E. S