Designing a multi-layered security algorithms for network intrusion detection systems on virtual machines in the cloudcomputing
نویسندگان
چکیده
منابع مشابه
Designing a multi-layered security algorithms for network intrusion detection systems on virtual machines in the cloud computing
With the emergence of new generation networks and providing new types of services, as cloud computing networks, the need to provide security that are compatible with the performance of these networks lead us to offer an algorithm for using the context of security available in prior networks. In this algorithm, intrusion detection systems(IDS) are activated depending on the service which selecte...
متن کاملA Multi-Stage Intrusion Detection Approach for Network Security
Nowadays, the massive increment in applications running on a computer and excessive in network services forces to take convenient security policies into an account. Many methods of intrusion detection proposed to provide security in a computer system and network using data mining methods. These methods comprise of the outlier, unsupervised and supervised methods. As we know, each data mining me...
متن کاملDependable Security: Testing Network Intrusion Detection Systems
The Network security systems have unique testing requirements. Like other systems, they need to be tested to ensure that they perform as expected, and to specify the conditions under which they might fail. However, un-like other systems, the data required to perform such testing is not easily or publicly available. In this paper we present the requirements for appropriate network traces for tes...
متن کاملCountermeasure Selection in Virtual Network Systems with Network Intrusion Detection
TheCloud security be prominent amongst the most essential issues that have pulled in a great deal of innovative work exertion in recent years. Especially, assailants can investigate vulnerabilities of a cloud framework and bargain virtual machines to convey further huge scale (Ddos)Distributed Denial-of-service. Ddos threats normally include early stage activities, for example, multistep abuse,...
متن کاملMulti-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning
During the last few years the computer network security remains a problem of great concern within information technology research area. Increase of network scale, development of advanced information technologies, and other factors enhance the number of possible targets for attacks against computer networks. These factors negatively influence upon the efficiency of the existing computer networks...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Engineering
سال: 2013
ISSN: 2278-8719,2250-3021
DOI: 10.9790/3021-03845260