Detection of Network Intrusion and Countermeasure Selection in Cloud Systems
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: In Cloud Server Systems, The detection of zombie in virtual machine is considered as the security threat exploration attacks is extremely difficult, due to this the cloud user can able to install harmful applications into their virtual server to attack the virtual server Particularly, intruders can exploit vulnerability to a cloud system and compromise virtual machines to deploy further large scale types of attack like distributed denial of service (DDOS). Mainly vulnerability arises in infrastructure as a service (laas) cloud where the infrastructure shared by millions of users. To prevent vulnerable virtual machine from being compromised in the cloud, the proposed framework introducing multiple distributed vulnerability detection network intrusion and countermeasure selection in cloud systems. It built an attack graph analytical model which is used for identify the intruders possible way of exploit vulnerability.
Qos Parameters of an Energy Efficient Multicast Congestion Control Protocol (Eemccp) Over Fading Channels
In this paper we propose an energy efficient multicasting congestion control protocol for mobile ad hoc networks (MANETs) over fading channels. Our proposed scheme overcomes the disadvantages of existing multicast conges...
Ranking Algorithm of Web Documents using Ontology
Abstract: Internet has become the most important part of everyone’s life where the large amount of information is stored in the form of text, audio, video etc. The Web information retrieval is a technique which h...
A Reflective Swarm Intelligence Algorithm
Swarm Intelligence (SI) algorithms are heuristics for finding the optimal solutions of optimization problems. They are made up of groups of swarms that interact with one another in the search effort within their...
Big Data Mining using Map Reduce: A Survey Paper
Abstract: Big data is large volume, heterogeneous, distributed data. Big data applications where datacollection has grown continuously, it is expensive to manage, capture or extract and process data using existings...
Outage Probability Performance Analysis of a New Hybrid Relay Selection Protocol
In this paper, the diversity gains of wireless relay networks were exploited. The proposed cooperative scheme using the first best relay for providing the highest SNR at the destination, whereas the second best relay is...