A Novel Framework to Detect and Migrate Collaborative Attacks in the Cloud Network
Authors:N.BALARAJ, SAKSHI SIVA RAMAKRISHNA
Authors:N.BALARAJ, SAKSHI SIVA RAMAKRISHNA
Abstract: Security is an important issue in cloud environment. Attackers can explore vulnerabilities of a cloud system and
compromise virtual machines to deploy further large scale Distributed Denial Of Service.(DDoS). To prevent vulnerable virtual
machine from being compromised in cloud a multiphase distributed vulnerability detection, measurement and countermeasure
selection mechanism called NICE have been proposed. These systems are used by number of organizations to detect the
weaknesses threats and preventing them. For this purpose, these systems became an important part of the security in nearly
every organization. The system and security evaluations demonstrate the efficiency and effectiveness of the proposed solution.
Keywords: Cloud Computing, Network Security, Intrusion Detection, Zombie Detection, Attack Graph.
INTRODUCTION
Users migrating to the cloud consider security as the
most important factor. A recent Cloud Security Alliance
(CSA) survey shows that among all security issues, abuse
and nefarious use of cloud computing is considered as the
top security threat, in which attackers can exploit
vulnerabilities in clouds and utilize cloud system resources
to deploy attacks. In traditional data centers, where system
administrators have full control over the host machines,
vulnerabilities can be detected and patched by the system
administrator in a centralized manner. However, patching
known security holes in cloud data centers, where cloud
users usually have the privilege to control software installed
on their managed VMs, may not work effectively and can
violate the Service Level Agreement (SLA). Furthermore,
cloud users can install vulnerable software on their VMs,
which essentially contributes to loopholes in cloud security.
The challenge is to establish an effective vulnerability/attack
detection and response system for accurately identifying
attacks and minimizing the impact of security breach to
cloud users addressed that protecting ”Business continuity
and services availability” from service outages is one of the
top concerns in cloud computing systems.
No comments:
Post a Comment