News Updates Sunday 28th May 2017 :
  • Welcome to International Press Corporation, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission last date of Mary/June 2017 extended to 30 May 2017, Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in University of Regensburg Germany, Google Scholar, Cross Reference data bases
  • Applications for reviewers are invited and can be sent directly to concerned editor's mail

Decision Tree based counter measures for Host-based IDS in Encrypted Network: A General Survey


Author : Swapnali G. Game, Sachin S. Taware and M. C. Kshirsagar

Pages : 77-79
Download PDF
Abstract

Providing Cloud security is one of challenging issues that has attracted a lot of research and development effort in last few years. In general, in very first step attackers tries to explore vulnerabilities of a cloud system and forces virtual machines to deploy further Distributed Denial-of-Service (DDoS) at a large-scale. DDoS attacks i.e variation of DOS attack usually involve early stage actions such as scanning low-frequency vulnerabilities, multistep exploitation and compromising identified vulnerable virtual machines as zombies and then at last achieving DDoS attacks through the compromised zombies. Within the cloud system, mainly in Infrastructure as a Service (IaaS) clouds, detecting zombie exploration attacks is extremely difficult. The main reason behind this may be that the cloud users may install vulnerable applications on their virtual machines. So that the security of the virtual machines get compromised. To avoid vulnerable virtual machines from being compromised in the cloud there is need of a multiphase distributed vulnerability detection, measurement, countermeasure selection mechanism. The security mechanism can be built based on attack graph-based analytical models and reconfigurable virtual network-based counter measures.

Keywords: Network Security, cloud computing, zombie detection, intrusion detection

Article published in International Journal of Current  Engineering  and Technology, Vol.4,No.1 (Feb- 2014)

 

 

 

 

Call for Papers
  1. IJCET- May/June-2017 Issue

    Submission Last Date
    30 May 2017
  2. IJTT-March-2017
  3. IJAIE-March-2017
  4. IJCSB-March-2017
INPRESSCO Indexing
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2017 INPRESSCO® All Rights Reserved