Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE)
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Attackers can look at vulnerabilities of a cloud system and compromise virtual machines to organize additional large-scale Distributed Denialof-Service (DDoS). DDoS attacks generally occupy early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks through the compromised zombies. Within the cloud system particularly the Infrastructure-as-aService (IaaS) clouds the detection of zombie study attacks is tremendously hard. This is for the reason that cloud users may set up susceptible applications on their virtual machines. To prevent susceptible virtual machines from being compromised in the cloud we suggest a multi-phase distributed vulnerability detection, measurement and countermeasure selection method called NICE which is built on attack graph based on analytical models and reconfigurable virtual network-based countermeasures. The planned framework leverages Open Flow network programming APIs to assemble a monitor and control plane over dispersed programmable virtual switches in order to considerably pick up attack detection and mitigate attack consequences.
Authors and Affiliations
B Hemanth, U Vinod Kumar
A Novel Approach for Text Dependent Speaker Recognition
In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...
A New Approach to Increase the Efficiency of Classical Approach In Designing Management Information Systems (MIS’S)
Classical approach is one of information systems methodologies that are used to design and build the management information systems (MIS’s), it always uses the all five stages in its life cycle during the design of (...
An Approach to Percolate Surplus Information Significances from OSN User Walls
As of Recent Years, Online Social Networks have transformed into a vital bit of step by step life for a few. One crucial issue in today user wall(s) is to give users the ability to control the messages posted in solitud...
Efficient Data Gathering with Mobile Collectors and Space-DMA Technique in Wireless Sensor Networks
Now a day’s efficient data gathering scheme in wireless sensor networks is has got more attention towards the research and development. This issue is taken care by using adopting mobility and Space Division Multiple...
Make Safe Data Promulgate In Multi Cloud Storage
The cloud computing technique provide a high range of service the society over the INTERNET. The unique features of clouding computing is that users data are processes remotely users does not own the machine or opera...