Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE)

Abstract

Attackers can look at vulnerabilities of a cloud system and compromise virtual machines to organize additional large-scale Distributed Denialof-Service (DDoS). DDoS attacks generally occupy early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks through the compromised zombies. Within the cloud system particularly the Infrastructure-as-aService (IaaS) clouds the detection of zombie study attacks is tremendously hard. This is for the reason that cloud users may set up susceptible applications on their virtual machines. To prevent susceptible virtual machines from being compromised in the cloud we suggest a multi-phase distributed vulnerability detection, measurement and countermeasure selection method called NICE which is built on attack graph based on analytical models and reconfigurable virtual network-based countermeasures. The planned framework leverages Open Flow network programming APIs to assemble a monitor and control plane over dispersed programmable virtual switches in order to considerably pick up attack detection and mitigate attack consequences.

Authors and Affiliations

B Hemanth, U Vinod Kumar

Keywords

Related Articles

Information Mining Thorugh Big Data

Big Data is another term used to recognize the datasets that because of their extensive size and multifaceted nature. Huge Data are currently quickly extending in all science and building spaces, including physical,...

Efficient Current Mode Multipliers in Signal Processing

This paper explains about the operation of the current mode multiplier circuits in signal processing. The multiplier/divider presents the advantage of very small linearity errors that can be obtained as a result of t...

Clustering For Non sentence Data Sets Using HFRECCA (Hierarchical Fuzzy Relational Eigenvector Centrality based Clustering Algorithm)

Clustering is the process of grouping or aggregating of data items. Sentence clustering mainly used in variety of applications such as classify and categorization of documents, automatic summary generation, organizin...

Automatic Weed Detection System And Smart Herbicide Sprayer Robot For Corn Fields

The goal of this paper is to develop an automatic plantation system.Here fruit and weed in the plantation is detected and herbicide is sprayed for the weed affected area.The temperature of the field is monitored inor...

Personalized Mobile Search Engine

We propose a personalized mobile search engine, PMSE, that captures the users’ preferences in the form of concepts by mining their click through data. Due to the importance of location information in mobile search, P...

Download PDF file
  • EP ID EP28102
  • DOI -
  • Views 265
  • Downloads 0

How To Cite

B Hemanth, U Vinod Kumar (2014). Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE). International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28102