Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE)
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Attackers can look at vulnerabilities of a cloud system and compromise virtual machines to organize additional large-scale Distributed Denialof-Service (DDoS). DDoS attacks generally occupy early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks through the compromised zombies. Within the cloud system particularly the Infrastructure-as-aService (IaaS) clouds the detection of zombie study attacks is tremendously hard. This is for the reason that cloud users may set up susceptible applications on their virtual machines. To prevent susceptible virtual machines from being compromised in the cloud we suggest a multi-phase distributed vulnerability detection, measurement and countermeasure selection method called NICE which is built on attack graph based on analytical models and reconfigurable virtual network-based countermeasures. The planned framework leverages Open Flow network programming APIs to assemble a monitor and control plane over dispersed programmable virtual switches in order to considerably pick up attack detection and mitigate attack consequences.
Authors and Affiliations
B Hemanth, U Vinod Kumar
Construction of Covert Channel Using Data Hiding Mechanism In Ipv4
Covert channel is a way of abstracting the information and hiding the information, in such a way that the reader should not analyse the hidden information and transmit the data to the destination. The covert techniqu...
SOLAR CHIRAL GRAPHENE BATTERY
We review the formulation of graphene’s massless Dirac equation, under the chiral electromagnetism approach, demystifying the material’s unusual chiral, relativistic, effective theory. In Dirac's theory, many authors...
A Hybrid Approach to Detect and Recognize Texts in Images
Text data present in images serves important information which is helpful for different applications. Locating text in case of variation in style, color, as well as complex image background makes text reading from imag...
Efficient Defence System For Avoid Malware Propagation In Mobile Network
We investigate the problem of how to optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disable further propagation, to minimize the number of infected n...
A New Heuristic Approach For Hide Valuable Information Of Organizations
Organizations accumulate and analyze customer data to pick up their services. Access Control Mechanisms(ACM) is used to make sure that only authorized information is on hand to users. Onthe other hand, sensitive info...