project repxort1111.docx

2
Title of the project- NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems . Team Members: 1. MITESH JAIN 1MV11CS056 2. NEERAJ KUMAR 1MV11CS061 3. KUMAR GAURAV 1MV11CS050 Department: Computer Science Name of the Guide: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Duration: From 20/02/2015 To 12/03/2015. Details of the Work carried out: SYSTEM ANALYSIS EXISTING SYSTEM Vulnerable Defense against Denial of Service (DDoS) Zombie attack Common Vulnerability Scoring System (CVSS) DRAWBACKS OF EXISTING SYSTEM Detection of Zombies Inefficient for combined effect of attacks Cost factor PROPOSED SYSTEM Detection of intrusion Blocking of zombies depending upon threshold Two phases of nice Light weight monitoring system by NICE A agent Periodically scanning the virtual system Blocking or allowing the client by using SAG. ADVANTAGES OF PROPOSED SYSTEM Defense-in-depth intrusion detection framework. The area of detecting malicious behavior has been well explored. Reduced risk of the cloud system being exploited or abused by internal or external attackers. PROPOSED TECHNIQUE Scenario Attack Graph (SAG). _______________________________________________________________________ _____

Upload: mitesh-jain

Post on 04-Oct-2015

214 views

Category:

Documents


2 download

DESCRIPTION

ss

TRANSCRIPT

Title of the project- NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.

Team Members: 1. MITESH JAIN 1MV11CS056 2. NEERAJ KUMAR 1MV11CS0613. KUMAR GAURAV 1MV11CS050

Department:Computer Science

Name of the Guide: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

Duration:From 20/02/2015 To 12/03/2015.

Details of the Work carried out:

SYSTEM ANALYSIS

EXISTING SYSTEM Vulnerable Defense against Denial of Service (DDoS) Zombie attack Common Vulnerability Scoring System (CVSS) DRAWBACKS OF EXISTING SYSTEM Detection of Zombies Inefficient for combined effect of attacks Cost factorPROPOSED SYSTEM Detection of intrusion Blocking of zombies depending upon threshold Two phases of nice Light weight monitoring system by NICE A agent Periodically scanning the virtual system Blocking or allowing the client by using SAG.ADVANTAGES OF PROPOSED SYSTEM Defense-in-depth intrusion detection framework. The area of detecting malicious behavior has been well explored. Reduced risk of the cloud system being exploited or abused by internal or external attackers. PROPOSED TECHNIQUE Scenario Attack Graph (SAG).____________________________________________________________________________

Signature of GuideSignature of Coordinator

Signature of HOD