Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{143194, author = {P.Sakthi Priyanka and C.Radha}, title = {SECURING THE NETWORK IN CLOUD ENVIRONMENT}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {2}, number = {7}, pages = {654-660}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=143194}, abstract = {A multiphase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, which is built on attack graph-based analytical models and reconfigurable virtual network-based countermeasures. The proposed framework leverages Open Flow network programming APIs to build a monitor and control plane over distributed programmable virtual switches to significantly improve attack detection and mitigate attack consequence. The system and security evaluations demonstrate the efficiency and effectiveness of the proposed solution. The proposed solution can significantly reduce the risk of the cloud system from being exploited and abused by internal and external attackers. NICE only investigates the network IDS approach to counter zombie exploitative attacks. To improve the detection accuracy, host-based IDS solutions are needed to be incorporated and to cover the whole spectrum of IDS in the cloud system.}, keywords = {Counter measures, IDS, Network Security, Virtual Machine, Vulnerability}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry