A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
DDoS attacks usually take up early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks through the compromised zombies. Within the cloud system particularly the Infrastructure-as-a-Service (IaaS) clouds the detection of zombie study attacks is extremely hard. This is for the reason that cloud users may set up vulnerable applications on their virtual machines. To prevent susceptible virtual machines from being compromised in the cloud we propose a multi-phase distributed vulnerability detection, measurement and countermeasure selection method called NICE which is built on attack graph based on analytical models and reconfigurable virtual network-based countermeasures.
Authors and Affiliations
K. Suganya| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem, A.P, India, ksuganyaprabu@gmail.com , K. T. V Subbarao| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem, A.P, India, ogidi@rediffmail.com
Shared Data Integrity Using Public Auditing Mechanism
Cloud providers assure a safer and dependable environment to the users, the honesty of data in the cloud may still be cooperation, due to the survival of hardware/software failures and human errors. To make certain s...
An Explorative Study On Quarry Dust Blended Geo Polymer Concrete For Various Concentrations Of Alkaline Activated Solution
Cement is the most generally utilized development material on the planet and Ordinary Portland Cement (OPC) is the real fixing utilized as a part of cement. The generation of bond discharges huge measure of carbon di...
Comparison of Several MLI Topologies Fed Brushless DC Machine Drive System
In this a novel seven inverter with lesser number of switches encouraged to BLDC engine drive is proposed. In a normal Brush Less DC engine (BLDC) drive, the engine when all is said in done bolstered with Pulse width...
Virus Attack Identification And Representation In Sensor Network
Clusters consist of circulated sensors and motor that interact with each other via wireless network. The use of open wireless intermediate and unattended deployment leaves these systems vulnerable to intelligent adve...
Fuel Cell Based Bridgeless Boost Rectifier For Low Voltage Energy Harvesting Applications
In energy producing systems power electronic circuit figures the key boundary between transducer and electronic load which might embrace a battery. The electrical and physical description of the power conditioning in...