📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 5, ISSUE 2, FEBRUARY 2016

Detection of Distributed Denial of Service and Counter Measure Selection Mechanism in Cloud System

Mrs. Sweta Kamat, Mrs. Poonam Sinai Kenkre, Mr. Shreedhar Niradi

DOI: 10.17148/IJARCCE.2016.5203

Abstract: Cloud security is one of most significant problems that have attracted plenty of analysis and development effort in past few years. Significantly, attackers will explore vulnerabilities of a cloud system and compromise virtual machines to deploy additional large-scale Distributed Denial-of-Service (DDoS). DDoS attacks typically involve early stage actions like multi-step exploitation, low frequency vulnerability scanning, and compromising known vulnerable virtual machines as zombies, and eventually DDoS attacks through the compromised zombies. Inside the cloud system, particularly the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is very troublesome. This is often as a result of cloud users could install vulnerable applications on their virtual machines. to forestall vulnerable virtual machines from being compromised within the cloud, we have a tendency to propose a multi-phase distributed vulnerability detection, activity, and measure choice mechanism referred to as NICE, that is constructed on attack graph primarily based analytical models and reconfigurable virtual network-based countermeasures. The planned framework leverages Open Flow schedule genus Apis to create a monitor and management plane over distributed programmable virtual switches so as to considerably improve attack detection and mitigate attack consequences. The system and security evaluations demonstrate the potency and effectiveness of the planned resolution.



Keywords: Network security, cloud computing, intrusion detection, attack graph, zombie detection.

How to Cite:

[1] Mrs. Sweta Kamat, Mrs. Poonam Sinai Kenkre, Mr. Shreedhar Niradi, “Detection of Distributed Denial of Service and Counter Measure Selection Mechanism in Cloud System,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2016.5203