SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 615 
SECURE INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL SYSTEM USING IDM Sinju N S1 1PG Scholar, Dept of CSE, Paavai Engineering College, Namakkal, Tamil Nadu, India Abstract In a virtual networked system where infrastructure is shared by more than one user security is a serious concern. Good network security protects a network in a manner that is consistent with its purpose and precautions must be taken when choosing a network provider for an organization. An attacker can enter into the system and compromise virtual machines and then exploit vulnerabilities. During the packet flow through the network experiences some delay. The existing intrusion detection processes incorrectly identify this delay as intruder’s attack. This work is intended to efficiently identify the intruders in the case of congestion and find possible countermeasure using Intrusion detection manager (IDM) in virtual networked system. The Intruder Detector and Manager (IDM) algorithm detects and prevents the intruder entering into the network by maintaining tables and reconfigurable virtual network-based countermeasures in order to avoid the masquerading DDoS attacks. When this procedure is followed, IDM increases the throughput by preventing intruders and maintains the history of intruders. Keywords: Network security, Intrusion detection, compromised machine, cloud computing, countermeasure selection. 
-----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION As the computer and networked system increases in the world of today major security challenge on the internet is the existence of the large number of compromised machine. This compromised machine used to launch various security attacks including spamming and spreading malware, DDoS, and identify theft. Nowadays all users are moving to a new technology called cloud computing [1], thus security in virtual networked system also an important aspect. The cloud model provides three types of services Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS). In SaaS the capability provided to the consumer is to use the provider‟s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). In PaaS the capability provided to the consumer is to deploy onto the cloud infrastructure his own applications without installing any platform or tools on their local machines. PaaS refers to providing platform layer resources, including operating system support and software development frameworks that can be used to build higher-level services. In IaaS the capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. 
IaaS providers offer their customers the illusion of unlimited compute, network, and storage capacity — often coupled with a „frictionless‟ registration process where anyone with a valid credit card can register and immediately begin using cloud services then exploit vulnerabilities and deploy attacks by utilizing the cloud system resources[2]. Since cloud users share the computing resources like file systems, data storage and connected through same switch attacks are more effective in cloud environment [3]. In this paper Secure Intrusion detection and countermeasure selection in virtual networked system incorporate IDM (Intrusion Detection Manager) Algorithm into intrusion detection process. Here the intrusion detection process is carried out in two phases. In first phase the IDM agent on each cloud server monitor and analyze the cloud traffic and in second phase the proposed system decides whether or not the VM put in inspection state. Based on this result Deep Packet inspection or traffic filtering is applied. This approach inspects all suspicious cloud traffic without affecting user‟s application. 2. RELATED WORK Network attacks have been discovered to be as varied as the system that they attempt to penetrate. Attacks are known to either be intentional or unintentional and technically competent intruders have been interested in targeting the protocols used for secure communication between networking devices. But as the intruders increase, the network experts are deriving many techniques in preventing attackers from accessing company networks.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 616 
SPOT system developed by Duan et al detects compromised machine by sequentially scanning outgoing messages. SPOT use sequential probability ratio test (SPRT) [4], it minimizes the expected number of observation to reach decision. SPRT is a statistical method; both the false positive and false negative probabilities can be bounded by user defined threshold. S.Roschke et al developed a new alert correlation algorithm based on attack graph [5]. Alert correlation was proposed to analyze alerts and to decrease false positives. Knowledge about the target system or environment is usually necessary for efficient alert correlation [6]. For representing the environment information as well as potential exploits, the existing vulnerabilities and their Attack Graph (AG) is used. Design a correlation algorithm based on AGs that is capable of detecting multiple attack scenarios for forensic analysis. It can be parameterized to adjust the robustness and accuracy [7]. P.Ammann et al proposed a scalable graph based vulnerability analysis; they represent more information explicitly than is necessary for the analyst. Although it is possible to produce attack trees from graph representation. This reduces the complexity of the analysis problem from exponential to polynomial, thereby bringing even very large networks within reach of analysis [8]. MulVAL an attack graph tool developed by X.Ou et al which uses Datalog as its modeling language. One of the important features of MulVAL is the ability to reason about multistage attacks. After an exploit is successfully applied, the reasoning engine must discover how the attacker can further compromise a system. The drawback of this approach is that when a new advisory comes, the scanning will have to be repeated on each host [9]. Lee W. and Stolfo S. and Mok K, a data mining framework for adaptively building Intrusion Detection (ID) models was developed. The central idea of this work is To utilize auditing programs to extract an extensive set of features that describes each network. BotHunter which detects compromised machine through malware infection process by correlating the IDS dialog trace in a network. BotHunter [10] tracks the two-way communication flows between internal assets and external entities, developing an evidence trail of data exchanges that match a state-based infection sequence model. BotSniffer , can capture the spatial-temporal correlation in network traffic and utilize statistical algorithms to detect botnets with theoretical bounds on the false positive and false negative rates. In botsniffer flaws are classified into groups based on the server connection. If the flaws within a group reveal behavioral similarity, the corresponding hosts involved are detected as being compromised [11]. 
Quite different from these methods this paper proposed IDM algorithm for network intrusion detection in virtual networked system. When this procedure is followed, IDM increases the throughput by preventing intruders and maintains the history of intruders and employ reconfigurable virtual network-based countermeasures in order to avoid the masquerading DDoS attacks. 
3. SYSTEM DESIGN 
3.1 System Design Overview 
The proposed framework is shown in fig- 1.IDM-Agent, Network controller ,Attack analyzer ,and Virtual machine profiler are the main component of the proposed system., Network controller ,Attack analyzer ,Virtual machine profiler are located in centralized manner .IDM-Agent is implemented using snort and is connected to the cloud server using an isolated secure channel. IDM-Agent monitors all the cloud traffic and sent intrusion detection alerts to control center when suspicious traffic is detected. The severity of the alert is analyzed by attack analyzer and select possible countermeasure .The selected countermeasures are initiated through network controller by reconfiguring virtual or physical or virtual OFS [12]. 
Fig-1.System architecture 3.2 System Components IDM-Agent The IDM-Agent scans all the cloud traffic and detects intruders using Intrusion Detection Manager Algorithm .It is implemented using snort for real-time traffic analysis and packet logging on internet protocol (IP). Algorithm: 1- IDM Start Event_type (login, logout) If (event_Request = login) then int_mac_a = get_Mac_Address() If (int_mac_a is in T2) then /*Check Intruders‟List*/ (Ignore the request) else if ( int_mac_a is in T3) then /*Check Authenticated Clients‟ List*/
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 617 
(Ignore login request) and 
(store int_mac_a in T2) 
else 
if ( int_mac_a is in T5) then /*Check CurrentClient‟s List*/ 
(Ignore the request) 
else 
(Accept the login request) and 
(Start communication) 
end if 
end if 
end if 
end if 
Stop 
IDM is intended to detect the alerts in an infrastructure 
network by maintaining five tables and a timer. The tables are 
named as account (T1), intruder (T2), authenticated client 
(T3), unauthenticated client (T4) and client table (T5). The 
descriptions of the tables are as follows: T1 is for checking the 
client identity based on their Medium Access Control (MAC) 
address. T2 contains the MAC address of all the intruders 
which was detected and spoofed by IDM. T3 consists of MAC 
addresses of (working) clients who are in the communication 
process, login time of the client and logout time. Table T4 
records the MAC address, login and logout time of client. 
Table T5, the client table, consists of MAC address and login 
time of all the clients. 
The IDM-Agent then passes all the detected alerts to attack 
analyzer for further processing. 
3.3 VM Profiling 
Collect information about VM state, open ports, services 
running.The information is collected from IDM-Agent, 
network controller and attack analyzer and is maintained in a 
VM profile Database and contain complete information about 
vulnerabilities, alert and traffic. 
3.4 Attack Analyzer 
Attack analyzer performs alert correlation; calculate severity 
of alert and countermeasure selection. The optimal 
countermeasures are selected from countermeasure pool using 
the countermeasure selection algorithm based on Return of 
Investment (ROI). 
ROI [t,cm]= 
푏푒푛푒푓푖푡 푡,푐푚 
푐표푠푡 .푐푚+푖푛푡푟푢푠푖푣푒푛푒푠푠 .푐푚 
. 
The countermeasure which gives least value of ROI is selected 
as optimal countermeasure. 
3.5 Network Controller 
Attack analyzer selects optimal countermeasure based on ROI 
value. The network controller gets this information from 
network controller and then executes the countermeasures. It 
will block the VM immediately when the virtual machine is 
detected as Zombie or the alert is severe. Otherwise put the 
suspected virtual machine into quarantine mode if the threat 
level is medium and if threat level is low put it into inspection 
state. 
4. RESULT AND ANALYSIS 
Proposed IDM is better in detecting and preventing DDoS 
Attacks in cloud IaaS when compared with the existing Attack 
gragh based alert correlation method. It also maintains 
duplicate IDM, which takes over the network, in case of 
IDM‟s failure. IDM updates the duplicate IDM often. When 
an intruder enters into the network with legitimate client‟s 
MAC address, the communication between client and cloud 
server isdisconnected. So the throughput of the system is 
dropped during the period of attack. The Fig- 2 clearly shows 
the rapid fall of throughput during the attack. 
Fig-2 Throughput measurements during DDoS attack 
After implementing IDM throughput does not decrease during 
the period of attack. The performance of the system is 
increased by maintaining the throughput. 
Fig-3 Throughput Measurements after implementing IDM
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 618 
5. CONCLUSIONS In this paper, secure intrusion and countermeasure selection in virtual system detects and prevents attacks in cloud IaaS using IDM .It employs a reconfigurable virtual networking approach for attack mitigation. This approach has significant improvement in attack detection during congestion. IDM increases the throughput by preventing intruders and maintains the history of intruders. REFERENCES [1]. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” ACM Comm., vol. 53, no. 4, pp. 50-58, Apr. 2010. [2]. Cloud Security Alliance, “Top Threats to Cloud Computing v1.0,” https://cloudsecurityalliance.org/topthreats/csathrats. v1.0.pdf, Mar. 2010. [3]. H. Takabi, J.B. Joshi, and G. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security and Privacy, vol. 8, no. 6, pp. 24-31, Dec. 2010. [4]. Z. Duan, P. Chen, F. Sanchez, Y. Dong, M. Stephenson, and J. Barker, “Detecting Spam Zombies by Monitoring Outgoing Messages,” IEEE Trans. Dependable and Secure Computing, vol. 9,no. 2, pp. 198-210, Apr. 2012. [5]. O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J.M. Wing,“Automated Generation and Analysis of Attack Graphs,” Proc. IEEE Symp. Security and Privacy, pp. 273- 284, 2002, [6]. S. Roschke, F. Cheng, and C. Meinel, “A New Alert Correlation Algorithm Based on Attack Graph,” Proc. Fourth Int‟l Conf. Computational Intelligence in Security for Information Systems, pp. 58-67, 2011. [7]. X. Ou, W.F. Boyer, and M.A. McQueen, “ A Scalable Approach to Attack Graph Generation,” Proc. 13th ACM Conf. Computer and Comm. Security (CCS ‟06), pp. 336-345, 2006. [8]. P. Ammann, D. Wijesekera, and S. Kaushik, “Scalable, graphbased network vulnerability analysis,” Proc. 9th ACM Conf. Computer and Comm. Security (CCS ‟02), pp. 217-224, 2002. [9]. X. Ou, S. Govindavajhala, and A.W. Appel, “MulVAL: A Logic- Based Network Security Analyzer,” Proc. 14th USENIX Security Symp., pp. 113-128, 2005. [10]. G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, “BotHunter: Detecting Malware Infection through IDS- driven Dialog Correlation,” Proc. 16th USENIX Security Symp. (SS ‟07), pp. 12:1-12:16, Aug. 2007. [11]. G. Gu, J. Zhang, and W. Lee, “BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic,” Proc. 15th Ann. Network and Distributed Sytem Security Symp. (NDSS ‟08), Feb. 2008. [12]. “Openflow,”http://www.openflow.org/wp/learnmore/, 2012.

Más contenido relacionado

La actualidad más candente

Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique IRJET Journal
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzyIJDKP
 
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionSecure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionUvaraj Shan
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityIAEME Publication
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...IJCSIS Research Publications
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logicijdpsjournal
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSieijjournal
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013ijcsbi
 
IDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision treesIDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision treesVahid Farrahi
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
DETECTING NETWORK ANOMALIES USING CUSUM and FCMDETECTING NETWORK ANOMALIES USING CUSUM and FCM
DETECTING NETWORK ANOMALIES USING CUSUM and FCMEditor IJMTER
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Editor IJMTER
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectioncsandit
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
 
Mas based framework to protect cloud computing
Mas based framework to protect cloud computingMas based framework to protect cloud computing
Mas based framework to protect cloud computingeSAT Publishing House
 

La actualidad más candente (18)

Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzy
 
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selectionSecure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
 
IDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision treesIDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision trees
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
DETECTING NETWORK ANOMALIES USING CUSUM and FCMDETECTING NETWORK ANOMALIES USING CUSUM and FCM
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
 
N44096972
N44096972N44096972
N44096972
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
 
Mas based framework to protect cloud computing
Mas based framework to protect cloud computingMas based framework to protect cloud computing
Mas based framework to protect cloud computing
 

Destacado

Design and implementation of address generator for wi max deinterleaver on fpga
Design and implementation of address generator for wi max deinterleaver on fpgaDesign and implementation of address generator for wi max deinterleaver on fpga
Design and implementation of address generator for wi max deinterleaver on fpgaeSAT Publishing House
 
Stress analysis of stick reinforced granite periwinkle concrete slab under un...
Stress analysis of stick reinforced granite periwinkle concrete slab under un...Stress analysis of stick reinforced granite periwinkle concrete slab under un...
Stress analysis of stick reinforced granite periwinkle concrete slab under un...eSAT Publishing House
 
Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...eSAT Publishing House
 
Experimental analysis and optimization of material consumption
Experimental analysis and optimization of material consumptionExperimental analysis and optimization of material consumption
Experimental analysis and optimization of material consumptioneSAT Publishing House
 
Cost effective and efficient industrial tank cleaning process
Cost effective and efficient industrial tank cleaning processCost effective and efficient industrial tank cleaning process
Cost effective and efficient industrial tank cleaning processeSAT Publishing House
 
Applications of matlab in optimization of bridge
Applications of matlab in optimization of bridgeApplications of matlab in optimization of bridge
Applications of matlab in optimization of bridgeeSAT Publishing House
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Publishing House
 
Analyzing the rainfall and temperature influence on municipal water consumpti...
Analyzing the rainfall and temperature influence on municipal water consumpti...Analyzing the rainfall and temperature influence on municipal water consumpti...
Analyzing the rainfall and temperature influence on municipal water consumpti...eSAT Publishing House
 
Development of pavement management strategies for
Development of pavement management strategies forDevelopment of pavement management strategies for
Development of pavement management strategies foreSAT Publishing House
 
An improved ip traceback mechanism for network
An improved ip traceback mechanism for networkAn improved ip traceback mechanism for network
An improved ip traceback mechanism for networkeSAT Publishing House
 
Double octagonalshape microstrip antenna
Double octagonalshape microstrip antennaDouble octagonalshape microstrip antenna
Double octagonalshape microstrip antennaeSAT Publishing House
 
An overview of stress analysis of high energy pipeline systems used in therma...
An overview of stress analysis of high energy pipeline systems used in therma...An overview of stress analysis of high energy pipeline systems used in therma...
An overview of stress analysis of high energy pipeline systems used in therma...eSAT Publishing House
 
Simulation of different power transmission systems and their capacity of redu...
Simulation of different power transmission systems and their capacity of redu...Simulation of different power transmission systems and their capacity of redu...
Simulation of different power transmission systems and their capacity of redu...eSAT Publishing House
 
A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...
A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...
A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...eSAT Publishing House
 
Wireless data transmission through uart port using arm & rf transceiver
Wireless data transmission through uart port using arm & rf transceiverWireless data transmission through uart port using arm & rf transceiver
Wireless data transmission through uart port using arm & rf transceivereSAT Publishing House
 
Lake sediment thickness estimation using ground penetrating radar
Lake sediment thickness estimation using ground penetrating radarLake sediment thickness estimation using ground penetrating radar
Lake sediment thickness estimation using ground penetrating radareSAT Publishing House
 
Enhanced performances of high frequency pulsed
Enhanced performances of high frequency pulsedEnhanced performances of high frequency pulsed
Enhanced performances of high frequency pulsedeSAT Publishing House
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileeSAT Publishing House
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkeSAT Publishing House
 

Destacado (20)

Design and implementation of address generator for wi max deinterleaver on fpga
Design and implementation of address generator for wi max deinterleaver on fpgaDesign and implementation of address generator for wi max deinterleaver on fpga
Design and implementation of address generator for wi max deinterleaver on fpga
 
Stress analysis of stick reinforced granite periwinkle concrete slab under un...
Stress analysis of stick reinforced granite periwinkle concrete slab under un...Stress analysis of stick reinforced granite periwinkle concrete slab under un...
Stress analysis of stick reinforced granite periwinkle concrete slab under un...
 
Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...
 
Experimental analysis and optimization of material consumption
Experimental analysis and optimization of material consumptionExperimental analysis and optimization of material consumption
Experimental analysis and optimization of material consumption
 
Cost effective and efficient industrial tank cleaning process
Cost effective and efficient industrial tank cleaning processCost effective and efficient industrial tank cleaning process
Cost effective and efficient industrial tank cleaning process
 
Applications of matlab in optimization of bridge
Applications of matlab in optimization of bridgeApplications of matlab in optimization of bridge
Applications of matlab in optimization of bridge
 
Ivrs based news extracting system
Ivrs based news extracting systemIvrs based news extracting system
Ivrs based news extracting system
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Analyzing the rainfall and temperature influence on municipal water consumpti...
Analyzing the rainfall and temperature influence on municipal water consumpti...Analyzing the rainfall and temperature influence on municipal water consumpti...
Analyzing the rainfall and temperature influence on municipal water consumpti...
 
Development of pavement management strategies for
Development of pavement management strategies forDevelopment of pavement management strategies for
Development of pavement management strategies for
 
An improved ip traceback mechanism for network
An improved ip traceback mechanism for networkAn improved ip traceback mechanism for network
An improved ip traceback mechanism for network
 
Double octagonalshape microstrip antenna
Double octagonalshape microstrip antennaDouble octagonalshape microstrip antenna
Double octagonalshape microstrip antenna
 
An overview of stress analysis of high energy pipeline systems used in therma...
An overview of stress analysis of high energy pipeline systems used in therma...An overview of stress analysis of high energy pipeline systems used in therma...
An overview of stress analysis of high energy pipeline systems used in therma...
 
Simulation of different power transmission systems and their capacity of redu...
Simulation of different power transmission systems and their capacity of redu...Simulation of different power transmission systems and their capacity of redu...
Simulation of different power transmission systems and their capacity of redu...
 
A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...
A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...
A study on glass fiber reinforced polymer clay nanocomposites with sandwich s...
 
Wireless data transmission through uart port using arm & rf transceiver
Wireless data transmission through uart port using arm & rf transceiverWireless data transmission through uart port using arm & rf transceiver
Wireless data transmission through uart port using arm & rf transceiver
 
Lake sediment thickness estimation using ground penetrating radar
Lake sediment thickness estimation using ground penetrating radarLake sediment thickness estimation using ground penetrating radar
Lake sediment thickness estimation using ground penetrating radar
 
Enhanced performances of high frequency pulsed
Enhanced performances of high frequency pulsedEnhanced performances of high frequency pulsed
Enhanced performances of high frequency pulsed
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobile
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
 

Similar a Secure Intrusion Detection and Countermeasure Selection in Virtual Systems Using IDM

HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
 
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesIJNSA Journal
 
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Editor IJCATR
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET Journal
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...IJNSA Journal
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMIRJET Journal
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...IAESIJAI
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxvoversbyobersby
 
Secure intrusion detection and attack measure selection in virtual network sy...
Secure intrusion detection and attack measure selection in virtual network sy...Secure intrusion detection and attack measure selection in virtual network sy...
Secure intrusion detection and attack measure selection in virtual network sy...Uvaraj Shan
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...Migrant Systems
 
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised AlgorithmsDDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised Algorithmsijfls
 
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSDDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSijfls
 

Similar a Secure Intrusion Detection and Countermeasure Selection in Virtual Systems Using IDM (20)

HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
 
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
 
1776 1779
1776 17791776 1779
1776 1779
 
1776 1779
1776 17791776 1779
1776 1779
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Vertualisation
VertualisationVertualisation
Vertualisation
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
 
Secure intrusion detection and attack measure selection in virtual network sy...
Secure intrusion detection and attack measure selection in virtual network sy...Secure intrusion detection and attack measure selection in virtual network sy...
Secure intrusion detection and attack measure selection in virtual network sy...
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
 
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised AlgorithmsDDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
 
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSDDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
 

Más de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Más de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Último

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 

Último (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 

Secure Intrusion Detection and Countermeasure Selection in Virtual Systems Using IDM

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 615 SECURE INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL SYSTEM USING IDM Sinju N S1 1PG Scholar, Dept of CSE, Paavai Engineering College, Namakkal, Tamil Nadu, India Abstract In a virtual networked system where infrastructure is shared by more than one user security is a serious concern. Good network security protects a network in a manner that is consistent with its purpose and precautions must be taken when choosing a network provider for an organization. An attacker can enter into the system and compromise virtual machines and then exploit vulnerabilities. During the packet flow through the network experiences some delay. The existing intrusion detection processes incorrectly identify this delay as intruder’s attack. This work is intended to efficiently identify the intruders in the case of congestion and find possible countermeasure using Intrusion detection manager (IDM) in virtual networked system. The Intruder Detector and Manager (IDM) algorithm detects and prevents the intruder entering into the network by maintaining tables and reconfigurable virtual network-based countermeasures in order to avoid the masquerading DDoS attacks. When this procedure is followed, IDM increases the throughput by preventing intruders and maintains the history of intruders. Keywords: Network security, Intrusion detection, compromised machine, cloud computing, countermeasure selection. -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION As the computer and networked system increases in the world of today major security challenge on the internet is the existence of the large number of compromised machine. This compromised machine used to launch various security attacks including spamming and spreading malware, DDoS, and identify theft. Nowadays all users are moving to a new technology called cloud computing [1], thus security in virtual networked system also an important aspect. The cloud model provides three types of services Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS). In SaaS the capability provided to the consumer is to use the provider‟s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). In PaaS the capability provided to the consumer is to deploy onto the cloud infrastructure his own applications without installing any platform or tools on their local machines. PaaS refers to providing platform layer resources, including operating system support and software development frameworks that can be used to build higher-level services. In IaaS the capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. IaaS providers offer their customers the illusion of unlimited compute, network, and storage capacity — often coupled with a „frictionless‟ registration process where anyone with a valid credit card can register and immediately begin using cloud services then exploit vulnerabilities and deploy attacks by utilizing the cloud system resources[2]. Since cloud users share the computing resources like file systems, data storage and connected through same switch attacks are more effective in cloud environment [3]. In this paper Secure Intrusion detection and countermeasure selection in virtual networked system incorporate IDM (Intrusion Detection Manager) Algorithm into intrusion detection process. Here the intrusion detection process is carried out in two phases. In first phase the IDM agent on each cloud server monitor and analyze the cloud traffic and in second phase the proposed system decides whether or not the VM put in inspection state. Based on this result Deep Packet inspection or traffic filtering is applied. This approach inspects all suspicious cloud traffic without affecting user‟s application. 2. RELATED WORK Network attacks have been discovered to be as varied as the system that they attempt to penetrate. Attacks are known to either be intentional or unintentional and technically competent intruders have been interested in targeting the protocols used for secure communication between networking devices. But as the intruders increase, the network experts are deriving many techniques in preventing attackers from accessing company networks.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 616 SPOT system developed by Duan et al detects compromised machine by sequentially scanning outgoing messages. SPOT use sequential probability ratio test (SPRT) [4], it minimizes the expected number of observation to reach decision. SPRT is a statistical method; both the false positive and false negative probabilities can be bounded by user defined threshold. S.Roschke et al developed a new alert correlation algorithm based on attack graph [5]. Alert correlation was proposed to analyze alerts and to decrease false positives. Knowledge about the target system or environment is usually necessary for efficient alert correlation [6]. For representing the environment information as well as potential exploits, the existing vulnerabilities and their Attack Graph (AG) is used. Design a correlation algorithm based on AGs that is capable of detecting multiple attack scenarios for forensic analysis. It can be parameterized to adjust the robustness and accuracy [7]. P.Ammann et al proposed a scalable graph based vulnerability analysis; they represent more information explicitly than is necessary for the analyst. Although it is possible to produce attack trees from graph representation. This reduces the complexity of the analysis problem from exponential to polynomial, thereby bringing even very large networks within reach of analysis [8]. MulVAL an attack graph tool developed by X.Ou et al which uses Datalog as its modeling language. One of the important features of MulVAL is the ability to reason about multistage attacks. After an exploit is successfully applied, the reasoning engine must discover how the attacker can further compromise a system. The drawback of this approach is that when a new advisory comes, the scanning will have to be repeated on each host [9]. Lee W. and Stolfo S. and Mok K, a data mining framework for adaptively building Intrusion Detection (ID) models was developed. The central idea of this work is To utilize auditing programs to extract an extensive set of features that describes each network. BotHunter which detects compromised machine through malware infection process by correlating the IDS dialog trace in a network. BotHunter [10] tracks the two-way communication flows between internal assets and external entities, developing an evidence trail of data exchanges that match a state-based infection sequence model. BotSniffer , can capture the spatial-temporal correlation in network traffic and utilize statistical algorithms to detect botnets with theoretical bounds on the false positive and false negative rates. In botsniffer flaws are classified into groups based on the server connection. If the flaws within a group reveal behavioral similarity, the corresponding hosts involved are detected as being compromised [11]. Quite different from these methods this paper proposed IDM algorithm for network intrusion detection in virtual networked system. When this procedure is followed, IDM increases the throughput by preventing intruders and maintains the history of intruders and employ reconfigurable virtual network-based countermeasures in order to avoid the masquerading DDoS attacks. 3. SYSTEM DESIGN 3.1 System Design Overview The proposed framework is shown in fig- 1.IDM-Agent, Network controller ,Attack analyzer ,and Virtual machine profiler are the main component of the proposed system., Network controller ,Attack analyzer ,Virtual machine profiler are located in centralized manner .IDM-Agent is implemented using snort and is connected to the cloud server using an isolated secure channel. IDM-Agent monitors all the cloud traffic and sent intrusion detection alerts to control center when suspicious traffic is detected. The severity of the alert is analyzed by attack analyzer and select possible countermeasure .The selected countermeasures are initiated through network controller by reconfiguring virtual or physical or virtual OFS [12]. Fig-1.System architecture 3.2 System Components IDM-Agent The IDM-Agent scans all the cloud traffic and detects intruders using Intrusion Detection Manager Algorithm .It is implemented using snort for real-time traffic analysis and packet logging on internet protocol (IP). Algorithm: 1- IDM Start Event_type (login, logout) If (event_Request = login) then int_mac_a = get_Mac_Address() If (int_mac_a is in T2) then /*Check Intruders‟List*/ (Ignore the request) else if ( int_mac_a is in T3) then /*Check Authenticated Clients‟ List*/
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 617 (Ignore login request) and (store int_mac_a in T2) else if ( int_mac_a is in T5) then /*Check CurrentClient‟s List*/ (Ignore the request) else (Accept the login request) and (Start communication) end if end if end if end if Stop IDM is intended to detect the alerts in an infrastructure network by maintaining five tables and a timer. The tables are named as account (T1), intruder (T2), authenticated client (T3), unauthenticated client (T4) and client table (T5). The descriptions of the tables are as follows: T1 is for checking the client identity based on their Medium Access Control (MAC) address. T2 contains the MAC address of all the intruders which was detected and spoofed by IDM. T3 consists of MAC addresses of (working) clients who are in the communication process, login time of the client and logout time. Table T4 records the MAC address, login and logout time of client. Table T5, the client table, consists of MAC address and login time of all the clients. The IDM-Agent then passes all the detected alerts to attack analyzer for further processing. 3.3 VM Profiling Collect information about VM state, open ports, services running.The information is collected from IDM-Agent, network controller and attack analyzer and is maintained in a VM profile Database and contain complete information about vulnerabilities, alert and traffic. 3.4 Attack Analyzer Attack analyzer performs alert correlation; calculate severity of alert and countermeasure selection. The optimal countermeasures are selected from countermeasure pool using the countermeasure selection algorithm based on Return of Investment (ROI). ROI [t,cm]= 푏푒푛푒푓푖푡 푡,푐푚 푐표푠푡 .푐푚+푖푛푡푟푢푠푖푣푒푛푒푠푠 .푐푚 . The countermeasure which gives least value of ROI is selected as optimal countermeasure. 3.5 Network Controller Attack analyzer selects optimal countermeasure based on ROI value. The network controller gets this information from network controller and then executes the countermeasures. It will block the VM immediately when the virtual machine is detected as Zombie or the alert is severe. Otherwise put the suspected virtual machine into quarantine mode if the threat level is medium and if threat level is low put it into inspection state. 4. RESULT AND ANALYSIS Proposed IDM is better in detecting and preventing DDoS Attacks in cloud IaaS when compared with the existing Attack gragh based alert correlation method. It also maintains duplicate IDM, which takes over the network, in case of IDM‟s failure. IDM updates the duplicate IDM often. When an intruder enters into the network with legitimate client‟s MAC address, the communication between client and cloud server isdisconnected. So the throughput of the system is dropped during the period of attack. The Fig- 2 clearly shows the rapid fall of throughput during the attack. Fig-2 Throughput measurements during DDoS attack After implementing IDM throughput does not decrease during the period of attack. The performance of the system is increased by maintaining the throughput. Fig-3 Throughput Measurements after implementing IDM
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 618 5. CONCLUSIONS In this paper, secure intrusion and countermeasure selection in virtual system detects and prevents attacks in cloud IaaS using IDM .It employs a reconfigurable virtual networking approach for attack mitigation. This approach has significant improvement in attack detection during congestion. IDM increases the throughput by preventing intruders and maintains the history of intruders. REFERENCES [1]. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” ACM Comm., vol. 53, no. 4, pp. 50-58, Apr. 2010. [2]. Cloud Security Alliance, “Top Threats to Cloud Computing v1.0,” https://cloudsecurityalliance.org/topthreats/csathrats. v1.0.pdf, Mar. 2010. [3]. H. Takabi, J.B. Joshi, and G. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security and Privacy, vol. 8, no. 6, pp. 24-31, Dec. 2010. [4]. Z. Duan, P. Chen, F. Sanchez, Y. Dong, M. Stephenson, and J. Barker, “Detecting Spam Zombies by Monitoring Outgoing Messages,” IEEE Trans. Dependable and Secure Computing, vol. 9,no. 2, pp. 198-210, Apr. 2012. [5]. O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J.M. Wing,“Automated Generation and Analysis of Attack Graphs,” Proc. IEEE Symp. Security and Privacy, pp. 273- 284, 2002, [6]. S. Roschke, F. Cheng, and C. Meinel, “A New Alert Correlation Algorithm Based on Attack Graph,” Proc. Fourth Int‟l Conf. Computational Intelligence in Security for Information Systems, pp. 58-67, 2011. [7]. X. Ou, W.F. Boyer, and M.A. McQueen, “ A Scalable Approach to Attack Graph Generation,” Proc. 13th ACM Conf. Computer and Comm. Security (CCS ‟06), pp. 336-345, 2006. [8]. P. Ammann, D. Wijesekera, and S. Kaushik, “Scalable, graphbased network vulnerability analysis,” Proc. 9th ACM Conf. Computer and Comm. Security (CCS ‟02), pp. 217-224, 2002. [9]. X. Ou, S. Govindavajhala, and A.W. Appel, “MulVAL: A Logic- Based Network Security Analyzer,” Proc. 14th USENIX Security Symp., pp. 113-128, 2005. [10]. G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, “BotHunter: Detecting Malware Infection through IDS- driven Dialog Correlation,” Proc. 16th USENIX Security Symp. (SS ‟07), pp. 12:1-12:16, Aug. 2007. [11]. G. Gu, J. Zhang, and W. Lee, “BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic,” Proc. 15th Ann. Network and Distributed Sytem Security Symp. (NDSS ‟08), Feb. 2008. [12]. “Openflow,”http://www.openflow.org/wp/learnmore/, 2012.