International Journal of Advance Computational Engineering and Networking (IJACEN)
current issues
Volume-8,Issue-4  ( Apr, 2020 )
Past issues
  1. Volume-8,Issue-3  ( Mar, 2020 )
  2. Volume-8,Issue-2  ( Feb, 2020 )
  3. Volume-8,Issue-1  ( Jan, 2020 )
  4. Volume-7,Issue-12  ( Dec, 2019 )
  5. Volume-7,Issue-11  ( Nov, 2019 )
  6. Volume-7, Issue-10  ( Oct, 2019 )
  7. Volume-7, Issue-9  ( Sep, 2019 )
  8. Volume-7, Issue-8  ( Aug, 2019 )
  9. Volume-7, Issue-7  ( Jul, 2019 )
  10. Volume-7, Issue-6  ( Jun, 2019 )

Statistics report
Aug. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 87
Paper Published : 1231
No. of Authors : 3095
  Journal Paper

Paper Title
Network Intrusion Node Clone Detection In Virtual Network Systems

This is because cloud users may install in danger applications on their virtual equipment. To prevent vulnerable virtual machines from being compromise in the cloud, a multi-phase scattered vulnerability exposure, measurement, and counter measure selection mechanism called NICE, which is built on attack graph based analytical models and reconfigurable virtual network-based counter measures. The proposed framework leverages Open Flow network programming APIs to build monitor and control plane over distributed programmable virtual switches in order to significantly improve attack detection and mitigate attack consequences. The system and security evaluations exhibit the efficiency and effectiveness of the proposed Solution. In this paper, we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is raise to catch cloned nodes effectively. The protocol performance on efficient storage consumption and high security level is theoretically deducted through a probability model, and the resulting equations, with necessary adjustments for real application, are supported by the simulations. Although the DHT-based protocol incurs similar communication cost as preceding approaches, it may be considered a little high for some scenarios. To address this concern, our second distributed detection protocol, named randomly directed exploration, presents good communication performance for dense sensor networks, by a probabilistic directed forwarding technique along with random initial direction and border determination. The simulation results uphold the protocol design and show its efficiency on communication overhead and satisfactory detection probability.


| PDF |
Viewed - 63
| Published on 2014-11-19
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World