International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)
Host-based infringement recognition solutions are desirable to be included and to swathe the whole spectrum of IDS in the cloud system. This should be investigated in the future work. Additionally, as indicated in the paper, the authors will investigate the scalability of the proposed NICE solution by investigating the decentralized network control and attack analysis model based on current study. Detecting intrusions in networks has become one of the most critical tasks to prevent their misuse by attackers. The rapid increase in network traffic and attacks made the Intrusion Detection Systems (IDS) to fail in terms of accuracy and efficiency in many situations.