SlideShare a Scribd company logo
NICE: Network Intrusion Detection and Countermeasure
Selection in Virtual Network Systems
ABSTRACT:
Cloud security is one of most important issues that have attracted a lot of research
and development effort in past few years. Particularly, attackers can explore
vulnerabilities of a cloud system and compromise virtual machines to deploy
further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually
involve early stage actions such as multi-step exploitation, low frequency
vulnerability scanning, and compromising identified vulnerable virtual machines as
zombies, and finally DDoS attacks through the compromised zombies. Within the
cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection
of zombie exploration attacks is extremely difficult. This is because cloud users
may install vulnerable applications on their virtual machines. To prevent
vulnerable virtual machines from being compromised in the cloud, we propose a
multi-phase distributed vulnerability detection, measurement, and countermeasure
selection mechanism called NICE, which is built on attack graph based analytical
models and reconfigurable virtual network-based countermeasures. The proposed
framework leverages Open Flow network programming APIs to build a monitor
and control plane over distributed programmable virtual switches in order to
significantly improve attack detection and mitigate attack consequences. The
system and security evaluations demonstrate the efficiency and effectiveness of the
proposed solution.
EXISTING SYSTEM:
Cloud users can install vulnerable software on their VMs, which essentially
contributes to loopholes in cloud security. The challenge is to establish an effective
vulnerability/attack detection and response system for accurately identifying
attacks and minimizing the impact of security breach to cloud users. In a cloud
system where the infrastructure is shared by potentially millions of users, abuse
and nefarious use of the shared infrastructure benefits attackers to exploit
vulnerabilities of the cloud and use its resource to deploy attacks in more efficient
ways. Such attacks are more effective in the cloud environment since cloud users
usually share computing resources, e.g., being connected through the same switch,
sharing with the same data storage and file systems, even with potential attackers.
The similar setup for VMs in the cloud, e.g., virtualization techniques, VM OS,
installed vulnerable software, networking, etc., attracts attackers to compromise
multiple VMs.
DISADVANTAGES OF EXISTING SYSTEM:
1. No detection and prevention framework in a virtual networking
environment.
2. Not accuracy in the attack detection from attackers.
PROPOSED SYSTEM:
In this article, we propose NICE (Network Intrusion detection and Countermeasure
selection in virtual network systems) to establish a defense-in-depth intrusion
detection framework. For better attack detection, NICE incorporates attack graph
analytical procedures into the intrusion detection processes. We must note that the
design of NICE does not intend to improve any of the existing intrusion detection
algorithms; indeed, NICE employs a reconfigurable virtual networking approach to
detect and counter the attempts to compromise VMs, thus preventing zombie VMs.
ADVANTAGES OF PROPOSED SYSTEM:
The contributions of NICE are presented as follows:
 We devise NICE, a new multi-phase distributed network intrusion detection
and prevention framework in a virtual networking environment that captures
and inspects suspicious cloud traffic without interrupting users’ applications
and cloud services.
 NICE incorporates a software switching solution to quarantine and inspect
suspicious VMs for further investigation and protection. Through
programmable network approaches, NICE can improve the attack detection
probability and improve the resiliency to VM exploitation attack without
interrupting existing normal cloud services.
 NICE employs a novel attack graph approach for attack detection and
prevention by correlating attack behavior and also suggests effective
countermeasures.
 NICE optimizes the implementation on cloud servers to minimize resource
consumption. Our study shows that NICE consumes less computational
overhead compared to proxy-based network intrusion detection solutions.
SYSTEM ARCHITECTURE:
ALGORITHM USED:
 Alert Correlation Algorithm
 Countermeasure Selection Algorithm
Nice network intrusion detection and countermeasure selection in virtual network systems
Nice network intrusion detection and countermeasure selection in virtual network systems
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Chun-Jen Chung, Student Member, IEEE, Pankaj Khatkar, Student Member, IEEE,
Tianyi Xing, Jeongkeun Lee, Member, IEEE, and Dijiang Huang Senior Member,
IEEE-“ NICE: Network Intrusion Detection and Countermeasure Selection in
Virtual Network Systems”- IEEE TRANSACTIONS ON DEPEDABLE AND
SECURE COMPUTING 2013

More Related Content

DOCX
Nice network intrusion detection and countermeasure
DOCX
Network Intrusion detection and Countermeasure sElection(NICE
DOC
A wireless intrusion detection system and a new attack model (synopsis)
PPTX
Network Intrusion Detection and Countermeasure Selection
PDF
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
PPTX
Next Generation Firewalls
PDF
Inherent Security Design Patterns for SDN/NFV Deployments
PDF
'Moon' Security Management System for OPNFV
Nice network intrusion detection and countermeasure
Network Intrusion detection and Countermeasure sElection(NICE
A wireless intrusion detection system and a new attack model (synopsis)
Network Intrusion Detection and Countermeasure Selection
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
Next Generation Firewalls
Inherent Security Design Patterns for SDN/NFV Deployments
'Moon' Security Management System for OPNFV

What's hot (19)

PDF
Cisco amp for networks
PDF
Cisco NGFW AMP
ODP
Ece seminar 20070927
PDF
Cisco amp everywhere
PDF
Network Function Virtualization - Security Best Practices AtlSecCon 2015
PDF
Poster_PamelaDempster_40096050
PDF
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
PDF
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
PPT
Proactive Security That Works
PDF
Cisco amp for endpoints
PPTX
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
PDF
Infrastructure as (Secure) Code
PPTX
Watchguard short introduction
PPTX
Sangfor ngfw 修订版
PPTX
Presentation1 shweta
PDF
Advanced Threat Protection – ultimátní bezpečnostní řešení
PPT
Encryption in the Cloud
PPTX
Wireless sensor network security issues
PDF
Cisco umbrella overview
Cisco amp for networks
Cisco NGFW AMP
Ece seminar 20070927
Cisco amp everywhere
Network Function Virtualization - Security Best Practices AtlSecCon 2015
Poster_PamelaDempster_40096050
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Proactive Security That Works
Cisco amp for endpoints
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Infrastructure as (Secure) Code
Watchguard short introduction
Sangfor ngfw 修订版
Presentation1 shweta
Advanced Threat Protection – ultimátní bezpečnostní řešení
Encryption in the Cloud
Wireless sensor network security issues
Cisco umbrella overview
Ad

Viewers also liked (17)

DOCX
Privacy preserving delegated access control in public clouds
DOCX
Target tracking and mobile sensor navigation in wireless sensor networks
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
2015 2016 ieee dot net project titles
DOCX
Privacy preserving public auditing for secure cloud storage
DOCX
Annotating search results from web databases
DOCX
How long to wait predicting bus arrival time with mobile phone based particip...
DOCX
Effective risk communication for android apps
DOCX
Anomaly detection via online over sampling principal component analysis
DOCX
Reversible data hiding with optimal value transfer
PDF
2015 2016 ieee vlsi project titles
DOCX
Bahg back bone-assisted hop greedy routing for vanet’s city environments
DOCX
A new algorithm for inferring user search goals with feedback sessions
DOCX
Target tracking and mobile sensor navigation in wireless sensor networks
DOCX
Context based access control systems for mobile devices
DOCX
Emap expedite message authentication protocol for vehicular ad hoc networks
DOCX
Eaack—a secure intrusion detection system for manets ns2
Privacy preserving delegated access control in public clouds
Target tracking and mobile sensor navigation in wireless sensor networks
Mona secure multi owner data sharing for dynamic groups in the cloud
2015 2016 ieee dot net project titles
Privacy preserving public auditing for secure cloud storage
Annotating search results from web databases
How long to wait predicting bus arrival time with mobile phone based particip...
Effective risk communication for android apps
Anomaly detection via online over sampling principal component analysis
Reversible data hiding with optimal value transfer
2015 2016 ieee vlsi project titles
Bahg back bone-assisted hop greedy routing for vanet’s city environments
A new algorithm for inferring user search goals with feedback sessions
Target tracking and mobile sensor navigation in wireless sensor networks
Context based access control systems for mobile devices
Emap expedite message authentication protocol for vehicular ad hoc networks
Eaack—a secure intrusion detection system for manets ns2
Ad

Similar to Nice network intrusion detection and countermeasure selection in virtual network systems (20)

DOCX
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...
PDF
Secure intrusion detection and attack measure selection
PDF
Secure intrusion detection and attack measure selection in virtual network sy...
PDF
M43057580
PDF
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
PDF
C43021014
PDF
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
PPTX
Prevention of Vulnerable Virtual Machines against DDOS.pptx
PDF
Vertualisation
PDF
An anomalous behavior detection model in cloud computing
PDF
Secure intrusion detection and countermeasure selection in virtual system usi...
PDF
Security research trends in 2020
PDF
Paper id 41201622
PPTX
Cloud security From Infrastructure to People-ware
PDF
Security and risk analysis in the cloud with software defined networking arch...
PDF
A Back Propagation Neural Network Intrusion Detection System Based on KVM
PDF
Iaetsd reducing security risks in virtual networks by
PDF
Top Cited Papers - International Journal of Network Security & Its Applicatio...
PDF
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
PDF
original research papers
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection in virtual network sy...
M43057580
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
C43021014
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Prevention of Vulnerable Virtual Machines against DDOS.pptx
Vertualisation
An anomalous behavior detection model in cloud computing
Secure intrusion detection and countermeasure selection in virtual system usi...
Security research trends in 2020
Paper id 41201622
Cloud security From Infrastructure to People-ware
Security and risk analysis in the cloud with software defined networking arch...
A Back Propagation Neural Network Intrusion Detection System Based on KVM
Iaetsd reducing security risks in virtual networks by
Top Cited Papers - International Journal of Network Security & Its Applicatio...
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
original research papers

Recently uploaded (20)

PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
RMMM.pdf make it easy to upload and study
PDF
01-Introduction-to-Information-Management.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Classroom Observation Tools for Teachers
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Cell Structure & Organelles in detailed.
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
GDM (1) (1).pptx small presentation for students
Module 4: Burden of Disease Tutorial Slides S2 2025
VCE English Exam - Section C Student Revision Booklet
102 student loan defaulters named and shamed – Is someone you know on the list?
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPH.pptx obstetrics and gynecology in nursing
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
RMMM.pdf make it easy to upload and study
01-Introduction-to-Information-Management.pdf
Microbial disease of the cardiovascular and lymphatic systems
O7-L3 Supply Chain Operations - ICLT Program
Sports Quiz easy sports quiz sports quiz
Renaissance Architecture: A Journey from Faith to Humanism
Pharmacology of Heart Failure /Pharmacotherapy of CHF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Insiders guide to clinical Medicine.pdf
Classroom Observation Tools for Teachers

Nice network intrusion detection and countermeasure selection in virtual network systems

  • 1. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems ABSTRACT: Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnerability scanning, and compromising identified vulnerable virtual machines as zombies, and finally DDoS attacks through the compromised zombies. Within the cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is extremely difficult. This is because cloud users may install vulnerable applications on their virtual machines. To prevent vulnerable virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, which is built on attack graph based analytical models and reconfigurable virtual network-based countermeasures. The proposed framework leverages Open Flow network programming APIs to build a monitor
  • 2. and control plane over distributed programmable virtual switches in order to significantly improve attack detection and mitigate attack consequences. The system and security evaluations demonstrate the efficiency and effectiveness of the proposed solution. EXISTING SYSTEM: Cloud users can install vulnerable software on their VMs, which essentially contributes to loopholes in cloud security. The challenge is to establish an effective vulnerability/attack detection and response system for accurately identifying attacks and minimizing the impact of security breach to cloud users. In a cloud system where the infrastructure is shared by potentially millions of users, abuse and nefarious use of the shared infrastructure benefits attackers to exploit vulnerabilities of the cloud and use its resource to deploy attacks in more efficient ways. Such attacks are more effective in the cloud environment since cloud users usually share computing resources, e.g., being connected through the same switch, sharing with the same data storage and file systems, even with potential attackers. The similar setup for VMs in the cloud, e.g., virtualization techniques, VM OS,
  • 3. installed vulnerable software, networking, etc., attracts attackers to compromise multiple VMs. DISADVANTAGES OF EXISTING SYSTEM: 1. No detection and prevention framework in a virtual networking environment. 2. Not accuracy in the attack detection from attackers. PROPOSED SYSTEM: In this article, we propose NICE (Network Intrusion detection and Countermeasure selection in virtual network systems) to establish a defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to compromise VMs, thus preventing zombie VMs. ADVANTAGES OF PROPOSED SYSTEM: The contributions of NICE are presented as follows:
  • 4.  We devise NICE, a new multi-phase distributed network intrusion detection and prevention framework in a virtual networking environment that captures and inspects suspicious cloud traffic without interrupting users’ applications and cloud services.  NICE incorporates a software switching solution to quarantine and inspect suspicious VMs for further investigation and protection. Through programmable network approaches, NICE can improve the attack detection probability and improve the resiliency to VM exploitation attack without interrupting existing normal cloud services.  NICE employs a novel attack graph approach for attack detection and prevention by correlating attack behavior and also suggests effective countermeasures.  NICE optimizes the implementation on cloud servers to minimize resource consumption. Our study shows that NICE consumes less computational overhead compared to proxy-based network intrusion detection solutions.
  • 5. SYSTEM ARCHITECTURE: ALGORITHM USED:  Alert Correlation Algorithm  Countermeasure Selection Algorithm
  • 8. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.
  • 9. REFERENCE: Chun-Jen Chung, Student Member, IEEE, Pankaj Khatkar, Student Member, IEEE, Tianyi Xing, Jeongkeun Lee, Member, IEEE, and Dijiang Huang Senior Member, IEEE-“ NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems”- IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 2013