Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE)

Abstract

Attackers can look at vulnerabilities of a cloud system and compromise virtual machines to organize additional large-scale Distributed Denialof-Service (DDoS). DDoS attacks generally occupy early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks through the compromised zombies. Within the cloud system particularly the Infrastructure-as-aService (IaaS) clouds the detection of zombie study attacks is tremendously hard. This is for the reason that cloud users may set up susceptible applications on their virtual machines. To prevent susceptible virtual machines from being compromised in the cloud we suggest a multi-phase distributed vulnerability detection, measurement and countermeasure selection method called NICE which is built on attack graph based on analytical models and reconfigurable virtual network-based countermeasures. The planned framework leverages Open Flow network programming APIs to assemble a monitor and control plane over dispersed programmable virtual switches in order to considerably pick up attack detection and mitigate attack consequences.

Authors and Affiliations

B Hemanth, U Vinod Kumar

Keywords

Related Articles

Implementation of a Personalized Mobile Query Search Engine

PMSE, Personalized Mobile Search Engine has been proposed to show any client craved result or re-ranking result as per the client given question (UGQ) which incorporates content and the area of the client. It meets e...

Evaluation of Forecast Scheme Performances Based on Statistical Error Measurements

This paper will review various forecast schemes. Some of the forecast schemes are based on data mining. Forecast schemes are introduced to reduce urban traffic congestion and to manage the travel information. The und...

Secure Authentication Schemes

There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...

Live Activity Index To Gather Effective Live Traffic Broadcasting To Users

A few online services give live movement information by dissecting gathered information from street sensors, activity cameras, and group sourcing strategies, for example, Google-Map, Navteq, INRIX Traffic Information...

Data Access Scheme to Probabilistically Coordinate Multiple Caching Nodes

The propose of caching strategy in wireless ad hoc networks benefits from the supposition of existing endto-end paths in the midst of mobile nodes, and the path from a supplicant to the data source remnants unchanged...

Download PDF file
  • EP ID EP28102
  • DOI -
  • Views 273
  • Downloads 0

How To Cite

B Hemanth, U Vinod Kumar (2014). Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE). International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28102