­
­
­
­

Inventi Impact - Cloud Computing

Articles

  • Inventi:ecc/15392/15
    NETWORK INTRUSION DETECTION AND SELECTION OF COUNTERMEASURE ELECTION
    Neha Y Thukral*

    We are too much dependent on computers and network these days and hence it has become important to provide security to computer and the network in order to protect our important data to get misused. Security of network is one of most important issues that have attracted a lot of researchers and development teams. Attackers can explore the weakness of a cloud system and compromise virtual machines in order to deploy Distributed Denial-of-Service (DDoS). DDoS attacks through the compromised zombies. In the cloud system, the detection of zombie exploration attacks is extremely difficult. This is because cloud users may install sensitive applications on their virtual machines. Therefore one need to have efficient method for the detection of such compromised machines in network those are involved in doing the activities like spamming. In order to prevent exposed machines from being compromised in the cloud, here we offer a multi-phase distributed vulnerability detection, measurement and countermeasure selection structure called NICE, which was built on attack graph based analytical models and reconfigurable virtual network-based countermeasures selected.

    How to Cite this Article
    Neha Y Thukral. Network Intrusion Detection and Selection of Countermeasure Election. Inventi Impact: Cloud Computing, 2015(3):135-138, 2015.
    Download Full Text