Author : Miss. Prachi N. Deshmukh 1
Date of Publication :26th April 2017
Abstract: There are various stakeholders having similar goals as well as policies due to which modification to the present internet is restricted to incremental updates; implementation of every novel fundamentally extraordinary innovation is beside inconceivable. To deal with this issue, proposed the concept of network virtualization, here designed as a diversifying attribute without having restriction of any system. By permitting multiple heterogeneous system structures to live together on a shared physical substrate, network virtualization gives flexibility, promotes diversity, and promises security and increased manageability. It reduces the maximum computation load, provide better resilience under traffic variability, and offer improved detection coverage.
Reference :
-
- A. Avritzer, R. G. Cole and E. J. Weyuker, “Monitoring for security intrusion using performance signature”, in tactical WOSP/SIPW ACM JANUARY 2010, pp.93-103.
- Antonis Papadogiannakis, Michalis Polychronakis and Evangelos P. Markatos,” Improving the accuracy of Network Intrusion Detection Systems Under Load Using Selective Packet Discarding” EUROSEC ACM 2010, pp. 15-21.
- Sekar, V., Krishnaswamy, R., Gupta, A., and Reiter, “Network-wide deployment of intrusion detection and prevention systems”, in proc. CoNEXT ’10, 2010.
- Victor Heorhiadi, Michael K. Reiter, and Vyas Sekar,”New Opportunities for Load Balancing in Network-Wide Intrusion Detection System”, in proc. CoNEXT ACM DECEMBER 2012. pp. 361-372.
- M. Aiello, E. Cambiaso, G. Papaleo, ” An On-line Intrusion Detection Approach to Identify Low-Rate DoS Attacks”, in proc. IEEE 2014.