Detection of Network Intrusion and Countermeasure Selection in Cloud Systems

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: In Cloud Server Systems, The detection of zombie in virtual machine is considered as the security threat exploration attacks is extremely difficult, due to this the cloud user can able to install harmful applications into their virtual server to attack the virtual server Particularly, intruders can exploit vulnerability to a cloud system and compromise virtual machines to deploy further large scale types of attack like distributed denial of service (DDOS). Mainly vulnerability arises in infrastructure as a service (laas) cloud where the infrastructure shared by millions of users. To prevent vulnerable virtual machine from being compromised in the cloud, the proposed framework introducing multiple distributed vulnerability detection network intrusion and countermeasure selection in cloud systems. It built an attack graph analytical model which is used for identify the intruders possible way of exploit vulnerability.

Authors and Affiliations

Keywords

Related Articles

Gender classification using face image and voice

Abstract: This paper is about gender classification using face image and voice of a speaker. The basic aim of the paper is to predict the gender of speaker through voice sample using Auto-correlation method and predict t...

Utility Mining Algorithm for High Utility Item sets from Transactional Databases

The discovery of item sets with high utility like profits is referred by mining high utility item sets from a transactional database. Although in recent years a number of relevant algorithms have been proposed, for high...

Big data

Abstract: Big data refers to huge chunks of data that are very large and complex for it to be processed or analyzed by traditional methods. Initially, this enormous amounts of data brought about major challenges concerni...

 Performance Analysis of Different Clustering Algorithm

 Abstract: Clustering is the process of grouping objects into clusters such that the objects from the sameclusters are similar and objects from different clusters are dissimilar. The relationship is often expressed...

Dynamic Advertising: A Big Data Analytics Approach

Due to development of malls there is a severe impact on local shops, leading to decline in sales of groceries, fruits and vegetables, processed foods, garments, shoes, electronic and electrical goods. All such local shop...

Download PDF file
  • EP ID EP105125
  • DOI 10.9790/0661-162108488
  • Views 111
  • Downloads 0

How To Cite

(2014).  Detection of Network Intrusion and Countermeasure Selection in Cloud Systems. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 84-88. https://europub.co.uk/articles/-A-105125