Prevention of Vulnerable Virtual Machines against DDOS Attacks in the Cloud

نویسنده

  • C. Kavitha
چکیده

Cloud Security is one amongst most significant problems that have attracted plenty of analysis and development effort in past few years. Notably, attackers will explore vulnerabilities of a cloud system and compromise virtual machines to deploy additional large-scale Distributed Denial-of-Service (DDoS). DDoS attacks sometimes involve early stage actions like multi-step exploitation, low frequency vulnerability scanning, and compromising identified vulnerable virtual machines as zombies, and at last DDoS attacks through the compromised zombies. Among the cloud system, particularly the Infrastructure-asa-Service (IaaS) clouds, the detection of zombie exploration attacks is extremely troublesome. This can be as a result of cloud users could install vulnerable applications on their virtual machines. To stop vulnerable virtual machines from being compromised within the cloud, we tend to propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection mechanism known as NICE, that is built on attack graph primarily based analytical models and reconfigurable virtual network-based countermeasures. KeywordsCloud Security, Cloud Attacks, Distributed Denial of Service Attack, NICE, Attack graph model

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rapid Decentralized Network Intrusion Defense System on Multiple Virtual Machines

Data breaches and cloud service abuse are the greatest cloud security threats according to cloud security alliance. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually takes place at early stage actions such as exploitation in multiple number of steps, vulne...

متن کامل

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-ofService (DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulner...

متن کامل

A Novel Intrusion Detection Using Decentralized Attack Analyzer and Network Controller in Virtual Network System

Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such as multi step exploitation, low frequency vuln...

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613

Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denialof-Service(DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnera...

متن کامل

Emerging Technologies: Impact on Information Security Risk Evaluation

The adoption of cloud computing is increasing and its use is becoming widespread in many sectors. As cloud service provision increases, legal and regulatory issues become more significant. In particular, the international nature of cloud provision raises concerns over the location of data and the laws to which they are subject. In this paper we investigate Information Flow Control (IFC) as a po...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014