Detection of Network Intrusion and Countermeasure Selection in Cloud Systems

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: In Cloud Server Systems, The detection of zombie in virtual machine is considered as the security threat exploration attacks is extremely difficult, due to this the cloud user can able to install harmful applications into their virtual server to attack the virtual server Particularly, intruders can exploit vulnerability to a cloud system and compromise virtual machines to deploy further large scale types of attack like distributed denial of service (DDOS). Mainly vulnerability arises in infrastructure as a service (laas) cloud where the infrastructure shared by millions of users. To prevent vulnerable virtual machine from being compromised in the cloud, the proposed framework introducing multiple distributed vulnerability detection network intrusion and countermeasure selection in cloud systems. It built an attack graph analytical model which is used for identify the intruders possible way of exploit vulnerability.

Authors and Affiliations

Keywords

Related Articles

 An SPRT Procedure for an Ungrouped Data using MMLE Approach

 Sequential Analysis of statistical science could be adopted in order to decide up on the reliable/unreliable of the developed software very quickly. Sequential analysis is different from classical hypothesis te...

 Mining Of Influential Users in a Blog Network

 Abstract: Blogging sites are very popular in today’s world; users interact with each other and create socialrelationships between them. Data mining methods can be used to extract the blogging sites. Users can be ac...

An Approach To Sentiment Analysis Using Lexicons With Comparative Analysis of Different Techniques

Abstract : The World Wide Web is growing at an astonishing rate. This has resulted in enormous increase in online communication. The online communication data consist of feedback, comments and reviews that are posted on...

Main Content Mining from Multi Data Region Deep Web Pages

Abstract: An Automatic Data extraction from the deep web pages is an endeavoring errand. Colossal web substance are gotten to as per well-known interest submitted to Web databases and the returned data records are e...

 Scalable Schedule Routing and Minimizing Delay in Tolerant Networks

 There are many routing strategies for message delivery in Delay Tolerant Networks. Among them Multicopying routing strategies have been considered the most applicable DTNs. Epidemic routing and two-hop forwarding r...

Download PDF file
  • EP ID EP105125
  • DOI 10.9790/0661-162108488
  • Views 97
  • Downloads 0

How To Cite

(2014).  Detection of Network Intrusion and Countermeasure Selection in Cloud Systems. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 84-88. https://europub.co.uk/articles/-A-105125