Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE)

Abstract

Attackers can look at vulnerabilities of a cloud system and compromise virtual machines to organize additional large-scale Distributed Denialof-Service (DDoS). DDoS attacks generally occupy early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks through the compromised zombies. Within the cloud system particularly the Infrastructure-as-aService (IaaS) clouds the detection of zombie study attacks is tremendously hard. This is for the reason that cloud users may set up susceptible applications on their virtual machines. To prevent susceptible virtual machines from being compromised in the cloud we suggest a multi-phase distributed vulnerability detection, measurement and countermeasure selection method called NICE which is built on attack graph based on analytical models and reconfigurable virtual network-based countermeasures. The planned framework leverages Open Flow network programming APIs to assemble a monitor and control plane over dispersed programmable virtual switches in order to considerably pick up attack detection and mitigate attack consequences.

Authors and Affiliations

B Hemanth, U Vinod Kumar

Keywords

Related Articles

A Novel Approach for Text Dependent Speaker Recognition

In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...

A New Approach to Increase the Efficiency of Classical Approach In Designing Management Information Systems (MIS’S)

Classical approach is one of information systems methodologies that are used to design and build the management information systems (MIS’s), it always uses the all five stages in its life cycle during the design of (...

An Approach to Percolate Surplus Information Significances from OSN User Walls

As of Recent Years, Online Social Networks have transformed into a vital bit of step by step life for a few. One crucial issue in today user wall(s) is to give users the ability to control the messages posted in solitud...

Efficient Data Gathering with Mobile Collectors and Space-DMA Technique in Wireless Sensor Networks

Now a day’s efficient data gathering scheme in wireless sensor networks is has got more attention towards the research and development. This issue is taken care by using adopting mobility and Space Division Multiple...

Make Safe Data Promulgate In Multi Cloud Storage

The cloud computing technique provide a high range of service the society over the INTERNET. The unique features of clouding computing is that users data are processes remotely users does not own the machine or opera...

Download PDF file
  • EP ID EP28102
  • DOI -
  • Views 252
  • Downloads 0

How To Cite

B Hemanth, U Vinod Kumar (2014). Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE). International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28102