Downloads: 113 | Views: 310
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.4 / 10
NICE-D: A Modified Approach for Cloud Security
Nikita T. Ramteke, Dr. Yashwant V. Chavan
Abstract: Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). Within the cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is extremely difficult. This is because cloud users may install vulnerable applications on their virtual machines. To prevent vulnerable virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE [1], which is built on attack graph based analytical models and reconfigurable virtual network-based countermeasures. The proposed framework leverages Open Flow network programming APIs to build a monitor and control plane over distributed programmable virtual switches in order to significantly improve attack detection and mitigate attack consequences. Existing NICE model uses signature based IDS i. e. SNORT [1], In this project work we improved the intrusion detection accuracy of NICE by using dynamic intrusion detection system (NICE-D). Dynamic IDS monitors the incoming traffic flow and anomalous time slot, and accordingly generates the new signature to identify the future intrusions over cloud system. The system and security evaluations demonstrate the efficiency and effectiveness of the proposed solution.
Keywords: DDos, Iaas, NICE, SNORT
Edition: Volume 3 Issue 12, December 2014
Pages: 1209 - 1212
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023
Pages: 2571 - 2575Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation
Harish Narne
Downloads: 42 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021
Pages: 139 - 144Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
Senthuran Nallainathan
Downloads: 102
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1809 - 1812Efficient Flow Marking IP Traceback System
Sonali H. Mane, S. Pratap Singh
Downloads: 102
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2832 - 2836Minimization of DDoS Attack using Firecol an Intrusion Prevention System
Bhagyashri Kotame, Shrinivas Sonkar