📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 6, ISSUE 6, JUNE 2017

Distributed Vulnerability Detection, Menstruation and Measure Choice Mechanism for Zombie Detection in Cloud Computing Environment

A. Srinivas, A. Sravanthi, Shazia

DOI: 10.17148/IJARCCE.2017.6639

Abstract: Cloud security is one in every of most significant problems that has attracted lots of analysis and development effort in past few years. Notably, attackers will explore vulnerabilities of a cloud system and compromise virtual machines to deploy any large-scale Distributed Denial-of- Service (DDoS). DDoS attacks typically involve early stage actions like multistep exploitation, low-frequency vulnerability scanning, and compromising known vulnerable virtual machines as zombies, and eventually DDoS attacks through the compromised zombies. Among the cloud system, particularly the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is extraordinarily troublesome. This is often as a result of cloud users might install vulnerable applications on their virtual machines. To stop vulnerable virtual machines from being compromised within the cloud, I tend to propose a point in time distributed vulnerability detection, menstruation, and measure choice mechanism known as NICE, that is constructed on attack graph-based analytical models and reconfigurable virtual network-based countermeasures. The planned framework leverages Open Flow schedule Apis to make a monitor and management plane over distributed programmable virtual switches to considerably improve attack detection and mitigate attack consequences. The system and Security evaluations demonstrate the potency and effectiveness of the planned answer.



Keywords: Attack Graph, Intrusion Detection, Cloud Computing, Network Security, Zombie Exploration Attacks.

How to Cite:

[1] A. Srinivas, A. Sravanthi, Shazia, “Distributed Vulnerability Detection, Menstruation and Measure Choice Mechanism for Zombie Detection in Cloud Computing Environment,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2017.6639