A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice

Abstract

DDoS attacks usually take up early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks through the compromised zombies. Within the cloud system particularly the Infrastructure-as-a-Service (IaaS) clouds the detection of zombie study attacks is extremely hard. This is for the reason that cloud users may set up vulnerable applications on their virtual machines. To prevent susceptible virtual machines from being compromised in the cloud we propose a multi-phase distributed vulnerability detection, measurement and countermeasure selection method called NICE which is built on attack graph based on analytical models and reconfigurable virtual network-based countermeasures.

Authors and Affiliations

K. Suganya| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem, A.P, India, ksuganyaprabu@gmail.com , K. T. V Subbarao| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem, A.P, India, ogidi@rediffmail.com

Keywords

Related Articles

Data Access In Disruption Tolerant Networks Using Cooperative Caching

Disruption tolerant networks (DTNs) consist of mobile devices that call each other opportunistically. Due to the low node density and impulsive no demobility, only broken network connectivity exists in DTNs, and the...

Fast Keyword Search Assumption In The Random Oracle (RO) Model

This proposes searchable public key ciphertexts with hidden structures (SPCHS) for keyword seek as quickly as conceivable without giving up semantic security of the encoded keywords. In SPCHS, all keyword searchable...

Enhance the data alignment results using multiple annotators

The Internet presents a huge amount of useful information which is usually formatted for its users.The information which is extracted from different databases it is also called as Web database.In online shopping our...

Enable Tpa To Perform Audits For Multiple Users Efficiently For Securing Cloud Storage

The concept of public audit capability has been planned in the conditions of make certain remotely stored data reliability under different system and security models. To fully make sure the data honesty and save the...

Stashing Scope Afore Encoding For Revocable Data Spanking In Encoded Images

Nowadays, information is rapidly available through the Internet. Companies have the ability to communicate with a worldwide audience through the World Wide Web. The extraction is performed in the reverse order as the...

Download PDF file
  • EP ID EP16420
  • DOI -
  • Views 326
  • Downloads 11

How To Cite

K. Suganya, K. T. V Subbarao (2014). A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice. International Journal of Science Engineering and Advance Technology, 2(12), 948-952. https://europub.co.uk/articles/-A-16420