SlideShare a Scribd company logo
NICE: Network Intrusion Detection and Countermeasure
Selection in Virtual Network Systems
ABSTRACT:
Cloud security is one of most important issues that have attracted a lot of research and
development effort in past few years. Particularly, attackers can explore vulnerabilities of a
cloud system and compromise virtual machines to deploy further large-scale Distributed
Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such as multi-step
exploitation, low frequency vulnerability scanning, and compromising identified vulnerable
virtual machines as zombies, and finally DDoS attacks through the compromised zombies.
Within the cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection
of zombie exploration attacks is extremely difficult. This is because cloud users may install
vulnerable applications on their virtual machines. To prevent vulnerable virtual machines from
being compromised in the cloud, we propose a multi-phase distributed vulnerability detection,
measurement, and countermeasure selection mechanism called NICE, which is built on attack
graph based analytical models and reconfigurable virtual network-based countermeasures. The
proposed framework leverages Open Flow network programming APIs to build a monitor and
control plane over distributed programmable virtual switches in order to significantly improve
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
attack detection and mitigate attack consequences. The system and security evaluations
demonstrate the efficiency and effectiveness of the proposed solution.
EXISTING SYSTEM:
Cloud users can install vulnerable software on their VMs, which essentially contributes to
loopholes in cloud security. The challenge is to establish an effective vulnerability/attack
detection and response system for accurately identifying attacks and minimizing the impact of
security breach to cloud users. In a cloud system where the infrastructure is shared by
potentially millions of users, abuse and nefarious use of the shared infrastructure benefits
attackers to exploit vulnerabilities of the cloud and use its resource to deploy attacks in more
efficient ways. Such attacks are more effective in the cloud environment since cloud users
usually share computing resources, e.g., being connected through the same switch, sharing with
the same data storage and file systems, even with potential attackers. The similar setup for VMs
in the cloud, e.g., virtualization techniques, VM OS, installed vulnerable software, networking,
etc., attracts attackers to compromise multiple VMs.
DISADVANTAGES OF EXISTING SYSTEM:
1. No detection and prevention framework in a virtual networking environment.
2. Not accuracy in the attack detection from attackers.
PROPOSED SYSTEM:
In this article, we propose NICE (Network Intrusion detection and Countermeasure selection in
virtual network systems) to establish a defense-in-depth intrusion detection framework. For
better attack detection, NICE incorporates attack graph analytical procedures into the intrusion
detection processes. We must note that the design of NICE does not intend to improve any of
the existing intrusion detection algorithms; indeed, NICE employs a reconfigurable virtual
networking approach to detect and counter the attempts to compromise VMs, thus preventing
zombie VMs.
ADVANTAGES OF PROPOSED SYSTEM:
The contributions of NICE are presented as follows:
 We devise NICE, a new multi-phase distributed network intrusion detection and
prevention framework in a virtual networking environment that captures and inspects
suspicious cloud traffic without interrupting users’ applications and cloud services.
 NICE incorporates a software switching solution to quarantine and inspect suspicious
VMs for further investigation and protection. Through programmable network
approaches, NICE can improve the attack detection probability and improve the
resiliency to VM exploitation attack without interrupting existing normal cloud services.
 NICE employs a novel attack graph approach for attack detection and prevention by
correlating attack behavior and also suggests effective countermeasures.
 NICE optimizes the implementation on cloud servers to minimize resource consumption.
Our study shows that NICE consumes less computational overhead compared to proxy-
based network intrusion detection solutions.
SYSTEM ARCHITECTURE:
ALGORITHM USED:
 Alert Correlation Algorithm
 Countermeasure Selection Algorithm
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Chun-Jen Chung, Student Member, IEEE, Pankaj Khatkar, Student Member, IEEE, Tianyi Xing,
Jeongkeun Lee, Member, IEEE, and Dijiang Huang Senior Member, IEEE-“ NICE: Network
Intrusion Detection and Countermeasure Selection in Virtual Network Systems”- IEEE
TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 2013

More Related Content

DOCX
Network Intrusion detection and Countermeasure sElection(NICE
DOC
A wireless intrusion detection system and a new attack model (synopsis)
PDF
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
DOCX
Nice network intrusion detection and countermeasure
PPTX
Network Intrusion Detection and Countermeasure Selection
DOCX
Nice network intrusion detection and countermeasure selection in virtual netw...
PDF
M43057580
PDF
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
Network Intrusion detection and Countermeasure sElection(NICE
A wireless intrusion detection system and a new attack model (synopsis)
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
Nice network intrusion detection and countermeasure
Network Intrusion Detection and Countermeasure Selection
Nice network intrusion detection and countermeasure selection in virtual netw...
M43057580
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...

What's hot (15)

PDF
IDS - Fact, Challenges and Future
PDF
TACTiCS_WP Security_Addressing Security in SDN Environment
PPTX
Wireless sensor network security issues
PDF
Icacci presentation-cnn intrusion
PDF
Poster_PamelaDempster_40096050
PDF
NSAS: NETWORK SECURITY AWARENESS SYSTEM
PDF
F0371046050
PDF
Defending Industrial Control Systems From Cyberattack
PPTX
A system for denial of-service attack detection based on multivariate correla...
PDF
Review of Security Issues in Mobile Wireless Sensor Networks
ODP
Ece seminar 20070927
PDF
Wireless Sensor Networks: An Overview on Security Issues and Challenges
PDF
Tinysec
PDF
Cisco - See Everything, Secure Everything
PDF
A review of security attacks and intrusion detection schemes in wireless sens...
IDS - Fact, Challenges and Future
TACTiCS_WP Security_Addressing Security in SDN Environment
Wireless sensor network security issues
Icacci presentation-cnn intrusion
Poster_PamelaDempster_40096050
NSAS: NETWORK SECURITY AWARENESS SYSTEM
F0371046050
Defending Industrial Control Systems From Cyberattack
A system for denial of-service attack detection based on multivariate correla...
Review of Security Issues in Mobile Wireless Sensor Networks
Ece seminar 20070927
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Tinysec
Cisco - See Everything, Secure Everything
A review of security attacks and intrusion detection schemes in wireless sens...
Ad

Similar to JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems (20)

PDF
Secure intrusion detection and attack measure selection
PDF
Secure intrusion detection and attack measure selection in virtual network sy...
PDF
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
PDF
C43021014
PPTX
Prevention of Vulnerable Virtual Machines against DDOS.pptx
PDF
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
PDF
Vertualisation
PDF
Secure intrusion detection and countermeasure selection in virtual system usi...
PDF
Security research trends in 2020
PDF
Paper id 41201622
PDF
An anomalous behavior detection model in cloud computing
PDF
Firewall and vpn investigation on cloud computing performance
PDF
A Collaborative Intrusion Detection System for Cloud Computing
PDF
Ijsrdv1 i4019
PDF
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
PDF
Security and risk analysis in the cloud with software defined networking arch...
PDF
New Research Articles 2021 June Issue International Journal of Computer Scien...
PDF
Iaetsd reducing security risks in virtual networks by
PDF
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computi...
PDF
April 2021: Top 10 View Article in Computer Science & Information Technology
Secure intrusion detection and attack measure selection
Secure intrusion detection and attack measure selection in virtual network sy...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
C43021014
Prevention of Vulnerable Virtual Machines against DDOS.pptx
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Vertualisation
Secure intrusion detection and countermeasure selection in virtual system usi...
Security research trends in 2020
Paper id 41201622
An anomalous behavior detection model in cloud computing
Firewall and vpn investigation on cloud computing performance
A Collaborative Intrusion Detection System for Cloud Computing
Ijsrdv1 i4019
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
Security and risk analysis in the cloud with software defined networking arch...
New Research Articles 2021 June Issue International Journal of Computer Scien...
Iaetsd reducing security risks in virtual networks by
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computi...
April 2021: Top 10 View Article in Computer Science & Information Technology
Ad

More from IEEEGLOBALSOFTTECHNOLOGIES (20)

DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
Advanced methodologies resolving dimensionality complications for autism neur...
Dropbox Q2 2025 Financial Results & Investor Presentation
Empathic Computing: Creating Shared Understanding
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
Programs and apps: productivity, graphics, security and other tools
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
sap open course for s4hana steps from ECC to s4
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Unlocking AI with Model Context Protocol (MCP)

JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

  • 1. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems ABSTRACT: Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnerability scanning, and compromising identified vulnerable virtual machines as zombies, and finally DDoS attacks through the compromised zombies. Within the cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is extremely difficult. This is because cloud users may install vulnerable applications on their virtual machines. To prevent vulnerable virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, which is built on attack graph based analytical models and reconfigurable virtual network-based countermeasures. The proposed framework leverages Open Flow network programming APIs to build a monitor and control plane over distributed programmable virtual switches in order to significantly improve GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. attack detection and mitigate attack consequences. The system and security evaluations demonstrate the efficiency and effectiveness of the proposed solution. EXISTING SYSTEM: Cloud users can install vulnerable software on their VMs, which essentially contributes to loopholes in cloud security. The challenge is to establish an effective vulnerability/attack detection and response system for accurately identifying attacks and minimizing the impact of security breach to cloud users. In a cloud system where the infrastructure is shared by potentially millions of users, abuse and nefarious use of the shared infrastructure benefits attackers to exploit vulnerabilities of the cloud and use its resource to deploy attacks in more efficient ways. Such attacks are more effective in the cloud environment since cloud users usually share computing resources, e.g., being connected through the same switch, sharing with the same data storage and file systems, even with potential attackers. The similar setup for VMs in the cloud, e.g., virtualization techniques, VM OS, installed vulnerable software, networking, etc., attracts attackers to compromise multiple VMs. DISADVANTAGES OF EXISTING SYSTEM: 1. No detection and prevention framework in a virtual networking environment. 2. Not accuracy in the attack detection from attackers. PROPOSED SYSTEM: In this article, we propose NICE (Network Intrusion detection and Countermeasure selection in virtual network systems) to establish a defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion detection algorithms; indeed, NICE employs a reconfigurable virtual
  • 3. networking approach to detect and counter the attempts to compromise VMs, thus preventing zombie VMs. ADVANTAGES OF PROPOSED SYSTEM: The contributions of NICE are presented as follows:  We devise NICE, a new multi-phase distributed network intrusion detection and prevention framework in a virtual networking environment that captures and inspects suspicious cloud traffic without interrupting users’ applications and cloud services.  NICE incorporates a software switching solution to quarantine and inspect suspicious VMs for further investigation and protection. Through programmable network approaches, NICE can improve the attack detection probability and improve the resiliency to VM exploitation attack without interrupting existing normal cloud services.  NICE employs a novel attack graph approach for attack detection and prevention by correlating attack behavior and also suggests effective countermeasures.  NICE optimizes the implementation on cloud servers to minimize resource consumption. Our study shows that NICE consumes less computational overhead compared to proxy- based network intrusion detection solutions.
  • 4. SYSTEM ARCHITECTURE: ALGORITHM USED:  Alert Correlation Algorithm  Countermeasure Selection Algorithm
  • 7. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above. REFERENCE: Chun-Jen Chung, Student Member, IEEE, Pankaj Khatkar, Student Member, IEEE, Tianyi Xing, Jeongkeun Lee, Member, IEEE, and Dijiang Huang Senior Member, IEEE-“ NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems”- IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 2013