Prevention of Vulnerable Virtual Machines against DDOS Attacks in the Cloud
نویسنده
چکیده
Cloud Security is one amongst most significant problems that have attracted plenty of analysis and development effort in past few years. Notably, attackers will explore vulnerabilities of a cloud system and compromise virtual machines to deploy additional large-scale Distributed Denial-of-Service (DDoS). DDoS attacks sometimes involve early stage actions like multi-step exploitation, low frequency vulnerability scanning, and compromising identified vulnerable virtual machines as zombies, and at last DDoS attacks through the compromised zombies. Among the cloud system, particularly the Infrastructure-asa-Service (IaaS) clouds, the detection of zombie exploration attacks is extremely troublesome. This can be as a result of cloud users could install vulnerable applications on their virtual machines. To stop vulnerable virtual machines from being compromised within the cloud, we tend to propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection mechanism known as NICE, that is built on attack graph primarily based analytical models and reconfigurable virtual network-based countermeasures. KeywordsCloud Security, Cloud Attacks, Distributed Denial of Service Attack, NICE, Attack graph model
منابع مشابه
Rapid Decentralized Network Intrusion Defense System on Multiple Virtual Machines
Data breaches and cloud service abuse are the greatest cloud security threats according to cloud security alliance. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually takes place at early stage actions such as exploitation in multiple number of steps, vulne...
متن کاملScalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-ofService (DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulner...
متن کاملA Novel Intrusion Detection Using Decentralized Attack Analyzer and Network Controller in Virtual Network System
Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such as multi step exploitation, low frequency vuln...
متن کاملIJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613
Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denialof-Service(DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnera...
متن کاملEmerging Technologies: Impact on Information Security Risk Evaluation
The adoption of cloud computing is increasing and its use is becoming widespread in many sectors. As cloud service provision increases, legal and regulatory issues become more significant. In particular, the international nature of cloud provision raises concerns over the location of data and the laws to which they are subject. In this paper we investigate Information Flow Control (IFC) as a po...
متن کامل