NICE A: Implementation with Active Intrusion Detection System

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2

Abstract

Intrusion Detection and Prevention Systems (IDPS) are used: to identify possible attacks, collecting information about them and the trying to stop their occurrence and at last reporting them to the system administrator. These systems are used by some organizations to detect the weaknesses in their security policies, documenting existing attacks and threats and preventing an individual from violating security policies. Because of their advantages these systems became an important part of the security infrastructure in nearly every organization. In a Cloud computing environment, attackers can determine the vulnerabilities in the cloud systems and compromise the virtual machines to set out large scale Distributed Denial-of-Service (DDOS) attack. To avert these virtual machines from concession, we propose a multi-phase solution NICE (Network Intrusion Detection and Countermeasure selection in Virtual Network Systems).

Authors and Affiliations

Keywords

Related Articles

A Comparative Study of Salmon Calcitonin and Zoledronic Acid in the Treatment of Osteoporosis

Objective: To compare increase in BMD following treatment with salmon calcitonin or zoledronic acid in osteoporosis and to compare the side effects of each drug. Materials and method: 50 patients (25 in each group) who a...

Mössbauer Spectroscopic Study of Chemical Effect of Ascorbic Acid on Corrosion Product of Mild Steel

A systematic study of the influence of ascorbic acid on the corrosion product of mild steel has been carried out using Mössbauer spectroscopy (MS). It is observed that practically ascorbic acid has very little chemical i...

Multi-Feature Based Fire Detection Using Video Image Processing

As fire is one of the great threats for human security fire detection systems are one of the most important components in surveillance systems used to monitor buildings and environment as part of an early warning mechani...

Comparative Study of MAC Algorithms in Pervasive Computing Environment

Nowadays coming technology, many applications dependupon the existence of small devices that can exchange, share the information and formcommunication networks. In an expressive manner of such applications, the confident...

Library Automation in the Academic Institutions

The study presents the review status of automation for the academic institutions like libraries and the information centers. The utilization of Information and communication Technology (ICT) facilitate facile & immediate...

Download PDF file
  • EP ID EP356501
  • DOI -
  • Views 69
  • Downloads 0

How To Cite

(2015). NICE A: Implementation with Active Intrusion Detection System. International Journal of Science and Research (IJSR), 4(2), -. https://europub.co.uk/articles/-A-356501