IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613

نویسنده

  • Shruthi S
چکیده

Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denialof-Service(DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnerability scanning, and compromising identified vulnerable virtual machines as zombies, and finally DDoS attacks through the compromised zombies. Within the cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is extremely difficult. This is because cloud users may install vulnerable applications on their virtual machines. To prevent vulnerable virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, which is built on attack graph based analytical models and reconfigurable virtual network-based countermeasures. Keyword: Network Security, Cloud Computing, Intrusion Detection, Attack Graph, Zombie Detection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613

Abstract— The last decade has witnessed a growing demand for wireless radio spectrum due to the rapid deployment of new wireless devices and applications. Spectrum is a precious resource and thus underutilization of a large part of allocated spectrum is not acceptable. Cognitive Radio(CR) is proposed as a promising solution for increasing spectrum utilization. We conduct simulations to validate...

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 07, 2014 | ISSN (online): 2321-0613

This paper investigated the performance of Mary DPSK on Rayleigh Channel on the basis of Bit Error Rate (BER). BER is calculated by using simulation of system model consisting of source, modulator, channel and demodulator on MATLAB platform.

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 04, 2014 | ISSN (online): 2321-0613

In this paper, we present a literature survey of the modern data classification and prediction algorithms. All these algorithms are very important in real world applications likeheart disease prediction, cancer prediction etc. Classification of data is a very popular and computationally expensive task. The fundamentals of data classification are also discussed in brief.

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613

Dandy-Walker malformation is characterised by agenesis or hypoplasia of the cerebellar vermis, cystic dilatation of the fourth ventricle, and enlargement of the posterior fossa. Approximately 70-90% of patients have hydrocephalus. Lissencephaly is characterised by absence (agyria) or incomplete development (pachygyria) of the gyri of the cerebral cortex, causing the brain's surface to appear un...

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613

In last decades, Image registration is widely in use and there is broad range of applications in field of remote sensing ,computer science, image compression, face recognition and specially in medical field where it is use to integrate information obtained from different sources. Image registration is a vital part of restoration that uses objective criteria and previous information to enhance i...

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613

we are going to tell about how client data and confidentiality maintained in mobile devices through semantic analysis. Recent advance in context modeling, tracking and mutual localization has led to the materialization of a new class of smart phone applications that can access and share implanted sensor data. Mobile devices which have OS frameworks like Android mechanisms for vibrant privacy co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014