Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE)

Abstract

Attackers can look at vulnerabilities of a cloud system and compromise virtual machines to organize additional large-scale Distributed Denialof-Service (DDoS). DDoS attacks generally occupy early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks through the compromised zombies. Within the cloud system particularly the Infrastructure-as-aService (IaaS) clouds the detection of zombie study attacks is tremendously hard. This is for the reason that cloud users may set up susceptible applications on their virtual machines. To prevent susceptible virtual machines from being compromised in the cloud we suggest a multi-phase distributed vulnerability detection, measurement and countermeasure selection method called NICE which is built on attack graph based on analytical models and reconfigurable virtual network-based countermeasures. The planned framework leverages Open Flow network programming APIs to assemble a monitor and control plane over dispersed programmable virtual switches in order to considerably pick up attack detection and mitigate attack consequences.

Authors and Affiliations

B Hemanth, U Vinod Kumar

Keywords

Related Articles

CLUMARE: A GUI Based Tool for Clustering Multidimensional Datasets Using Map Reduce

chiranjeevi416@gmail.com, Srinivas2804@gmail.com, parisakishore@gmail.com

M Commerce in India: Promise and Problems

The purpose of this research paper is to make the readers aware of current scenario and status of commerce in India especially M- commerce or mobile commerce. Now a days mobile phone rather smart phones, tablets, I-pa...

Secret Sharing of Convergent Keys to Third Party Concept of Dekey

Data de-duplication is a method for eliminating redundant data copies and has been widely used in cloud storage provider to reduce the storage space and bandwidth. The arising challenge is to perform secure de-duplic...

Evaluation of Forecast Scheme Performances Based on Statistical Error Measurements

This paper will review various forecast schemes. Some of the forecast schemes are based on data mining. Forecast schemes are introduced to reduce urban traffic congestion and to manage the travel information. The und...

A Mixture Cloud Approach For Safe Official Deduplications.

Cloud computing technology is widely used so that the data can be outsourced on cloud can accessed easily. Different members can share that data through different virtual machines but present on single physical machin...

Download PDF file
  • EP ID EP28102
  • DOI -
  • Views 272
  • Downloads 0

How To Cite

B Hemanth, U Vinod Kumar (2014). Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE). International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28102