Designing a multi-layered security algorithms for network intrusion detection systems on virtual machines in the cloud‏computing

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Designing a multi-layered security algorithms for network intrusion detection systems on virtual machines in the cloud computing

With the emergence of new generation networks and providing new types of services, as cloud computing networks, the need to provide security that are compatible with the performance of these networks lead us to offer an algorithm for using the context of security available in prior networks. In this algorithm, intrusion detection systems(IDS) are activated depending on the service which selecte...

متن کامل

A Multi-Stage Intrusion Detection Approach for Network Security

Nowadays, the massive increment in applications running on a computer and excessive in network services forces to take convenient security policies into an account. Many methods of intrusion detection proposed to provide security in a computer system and network using data mining methods. These methods comprise of the outlier, unsupervised and supervised methods. As we know, each data mining me...

متن کامل

Dependable Security: Testing Network Intrusion Detection Systems

The Network security systems have unique testing requirements. Like other systems, they need to be tested to ensure that they perform as expected, and to specify the conditions under which they might fail. However, un-like other systems, the data required to perform such testing is not easily or publicly available. In this paper we present the requirements for appropriate network traces for tes...

متن کامل

Countermeasure Selection in Virtual Network Systems with Network Intrusion Detection

TheCloud security be prominent amongst the most essential issues that have pulled in a great deal of innovative work exertion in recent years. Especially, assailants can investigate vulnerabilities of a cloud framework and bargain virtual machines to convey further huge scale (Ddos)Distributed Denial-of-service. Ddos threats normally include early stage activities, for example, multistep abuse,...

متن کامل

Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning

During the last few years the computer network security remains a problem of great concern within information technology research area. Increase of network scale, development of advanced information technologies, and other factors enhance the number of possible targets for attacks against computer networks. These factors negatively influence upon the efficiency of the existing computer networks...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOSR Journal of Engineering

سال: 2013

ISSN: 2278-8719,2250-3021

DOI: 10.9790/3021-03845260