A Novel Framework to Detect and Migrate Collaborative Attacks in the Cloud Network

A Novel Framework to Detect and Migrate Collaborative Attacks in the Cloud Network
Authors:N.BALARAJ, SAKSHI SIVA RAMAKRISHNA

Abstract: Security is an important issue in cloud environment. Attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large scale Distributed Denial Of Service.(DDoS). To prevent vulnerable virtual machine from being compromised in cloud a multiphase distributed vulnerability detection, measurement and countermeasure selection mechanism called NICE have been proposed. These systems are used by number of organizations to detect the weaknesses threats and preventing them. For this purpose, these systems became an important part of the security in nearly every organization. The system and security evaluations demonstrate the efficiency and effectiveness of the proposed solution. 

Keywords: Cloud Computing, Network Security, Intrusion Detection, Zombie Detection, Attack Graph.

 INTRODUCTION 
           Users migrating to the cloud consider security as the most important factor. A recent Cloud Security Alliance (CSA) survey shows that among all security issues, abuse and nefarious use of cloud computing is considered as the top security threat, in which attackers can exploit vulnerabilities in clouds and utilize cloud system resources to deploy attacks. In traditional data centers, where system administrators have full control over the host machines, vulnerabilities can be detected and patched by the system administrator in a centralized manner. However, patching known security holes in cloud data centers, where cloud users usually have the privilege to control software installed on their managed VMs, may not work effectively and can violate the Service Level Agreement (SLA). Furthermore, cloud users can install vulnerable software on their VMs, which essentially contributes to loopholes in cloud security. The challenge is to establish an effective vulnerability/attack detection and response system for accurately identifying attacks and minimizing the impact of security breach to cloud users addressed that protecting ”Business continuity and services availability” from service outages is one of the top concerns in cloud computing systems.

                                                                           Read More....



No comments:

Post a Comment