Downloads: 124 | Views: 262
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014 | Popularity: 6.3 / 10
Host Based Intrusion Detection to Prevent Virtual Network System from Intruders in Cloud
J. Sasi Devi, R. Sugumar
Abstract: In Cloud System, virtual machine is considered as the security threat. This is because all cloud users install their applications in virtual machines. Particularly, intruders can exploit vulnerability to a cloud system and compromise virtual machines to deploy further large scale types of attack like distributed denial of service (DDOS). Mainly vulnerability arises in infrastructure as a service (laas) cloud where the infrastructure shared by millions of users. To prevent vulnerable virtual machine from being compromised in the cloud, the proposed framework introducing multiphase distributed vulnerability detection measurement and countermeasure selection mechanism. It built an attack graph analytical model which is used for identify the intruders possible way of exploit vulnerability. The model consist information about virtual topology and also about cloud servers. Based on the information provided by the analytical model then the system deploy an appropriate counter measures.
Keywords: Cloud Server, DDOS, Intruders, Virtual machine, Vulnerability
Edition: Volume 3 Issue 3, March 2014
Pages: 373 - 376
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera