International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Network Intrusion Node Clone Detection In Virtual Network Systems

Author :R.ASHOK, S.KOKILA, M.GIRI

Article Citation :R.ASHOK ,S.KOKILA ,M.GIRI , (2014 ) " Network Intrusion Node Clone Detection In Virtual Network Systems " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 9-14, Volume-2, Issue-12

Abstract : This is because cloud users may install in danger applications on their virtual equipment. To prevent vulnerable virtual machines from being compromise in the cloud, a multi-phase scattered vulnerability exposure, measurement, and counter measure selection mechanism called NICE, which is built on attack graph based analytical models and reconfigurable virtual network-based counter measures. The proposed framework leverages Open Flow network programming APIs to build monitor and control plane over distributed programmable virtual switches in order to significantly improve attack detection and mitigate attack consequences. The system and security evaluations exhibit the efficiency and effectiveness of the proposed Solution. In this paper, we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is raise to catch cloned nodes effectively. The protocol performance on efficient storage consumption and high security level is theoretically deducted through a probability model, and the resulting equations, with necessary adjustments for real application, are supported by the simulations. Although the DHT-based protocol incurs similar communication cost as preceding approaches, it may be considered a little high for some scenarios. To address this concern, our second distributed detection protocol, named randomly directed exploration, presents good communication performance for dense sensor networks, by a probabilistic directed forwarding technique along with random initial direction and border determination. The simulation results uphold the protocol design and show its efficiency on communication overhead and satisfactory detection probability.

Type : Research paper

Published : Volume-2, Issue-12


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1514   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 69
| Published on 2014-11-19
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY