A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
DDoS attacks usually take up early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks through the compromised zombies. Within the cloud system particularly the Infrastructure-as-a-Service (IaaS) clouds the detection of zombie study attacks is extremely hard. This is for the reason that cloud users may set up vulnerable applications on their virtual machines. To prevent susceptible virtual machines from being compromised in the cloud we propose a multi-phase distributed vulnerability detection, measurement and countermeasure selection method called NICE which is built on attack graph based on analytical models and reconfigurable virtual network-based countermeasures.
Authors and Affiliations
K. Suganya| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem, A.P, India, ksuganyaprabu@gmail.com , K. T. V Subbarao| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem, A.P, India, ogidi@rediffmail.com
Data Access In Disruption Tolerant Networks Using Cooperative Caching
Disruption tolerant networks (DTNs) consist of mobile devices that call each other opportunistically. Due to the low node density and impulsive no demobility, only broken network connectivity exists in DTNs, and the...
Fast Keyword Search Assumption In The Random Oracle (RO) Model
This proposes searchable public key ciphertexts with hidden structures (SPCHS) for keyword seek as quickly as conceivable without giving up semantic security of the encoded keywords. In SPCHS, all keyword searchable...
Enhance the data alignment results using multiple annotators
The Internet presents a huge amount of useful information which is usually formatted for its users.The information which is extracted from different databases it is also called as Web database.In online shopping our...
Enable Tpa To Perform Audits For Multiple Users Efficiently For Securing Cloud Storage
The concept of public audit capability has been planned in the conditions of make certain remotely stored data reliability under different system and security models. To fully make sure the data honesty and save the...
Stashing Scope Afore Encoding For Revocable Data Spanking In Encoded Images
Nowadays, information is rapidly available through the Internet. Companies have the ability to communicate with a worldwide audience through the World Wide Web. The extraction is performed in the reverse order as the...