A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Counter measures In Cloud Environment
2014
International Journal of Computer Applications Technology and Research
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the
doi:10.7753/ijcatr0311.1018
fatcat:hq5v4hacyzhtdbp5ajg6erhuw4