News Updates Thursday 27th Oct 2016 :
  • Welcome to International Press Corporation, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission last date of Sept/Oct 2016 issue is 28 Oct 2016, Submit online or at
  • Our journals are indexed in University of Regensburg Germany, Google Scholar, Cross Reference data bases
  • Applications for reviewers are invited and can be sent directly to concerned editor's mail

Decision Tree based counter measures for Host-based IDS in Encrypted Network: A General Survey

Author : Swapnali G. Game, Sachin S. Taware and M. C. Kshirsagar

Pages : 77-79
Download PDF

Providing Cloud security is one of challenging issues that has attracted a lot of research and development effort in last few years. In general, in very first step attackers tries to explore vulnerabilities of a cloud system and forces virtual machines to deploy further Distributed Denial-of-Service (DDoS) at a large-scale. DDoS attacks i.e variation of DOS attack usually involve early stage actions such as scanning low-frequency vulnerabilities, multistep exploitation and compromising identified vulnerable virtual machines as zombies and then at last achieving DDoS attacks through the compromised zombies. Within the cloud system, mainly in Infrastructure as a Service (IaaS) clouds, detecting zombie exploration attacks is extremely difficult. The main reason behind this may be that the cloud users may install vulnerable applications on their virtual machines. So that the security of the virtual machines get compromised. To avoid vulnerable virtual machines from being compromised in the cloud there is need of a multiphase distributed vulnerability detection, measurement, countermeasure selection mechanism. The security mechanism can be built based on attack graph-based analytical models and reconfigurable virtual network-based counter measures.

Keywords: Network Security, cloud computing, zombie detection, intrusion detection

Article published in International Journal of Current  Engineering  and Technology, Vol.4,No.1 (Feb- 2014)





Call for Papers
  1. IJCET- Sept/Oct-2016 Issue

    Submission Last Date
    28 Oct 2016
  2. IJTT-Sept-2016
  3. IJAIE-Sept-2016
  4. IJCSB-Sept-2016
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2016 INPRESSCO® All Rights Reserved