CFP last date
20 December 2024
Reseach Article

Virtual Network Connection Technique to Control Device Remotely and Securely

by Ajit Patil, Aishwarya Laturkar, Priya Tathawade, Rutuja Takale, S. V. Athawale
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 8
Year of Publication: 2016
Authors: Ajit Patil, Aishwarya Laturkar, Priya Tathawade, Rutuja Takale, S. V. Athawale
10.5120/ijca2016912185

Ajit Patil, Aishwarya Laturkar, Priya Tathawade, Rutuja Takale, S. V. Athawale . Virtual Network Connection Technique to Control Device Remotely and Securely. International Journal of Computer Applications. 154, 8 ( Nov 2016), 28-32. DOI=10.5120/ijca2016912185

@article{ 10.5120/ijca2016912185,
author = { Ajit Patil, Aishwarya Laturkar, Priya Tathawade, Rutuja Takale, S. V. Athawale },
title = { Virtual Network Connection Technique to Control Device Remotely and Securely },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 154 },
number = { 8 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number8/26512-2016912185/ },
doi = { 10.5120/ijca2016912185 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:59:42.551915+05:30
%A Ajit Patil
%A Aishwarya Laturkar
%A Priya Tathawade
%A Rutuja Takale
%A S. V. Athawale
%T Virtual Network Connection Technique to Control Device Remotely and Securely
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 8
%P 28-32
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud security has been an important area of research nowadays. The vulnerabilities of cloud system can be easily explored by any attacker and compromise these virtual machines to deploy DDos i.e. Distributed denial of service attack which involves multi step exploitation, compromising virtual machines as zombies, low frequency vulnerability scanning and lastly DDos attack through the zombies. In Infrastructure-as-a-service (Iaas) clouds, detection of zombies is extremely difficult. Hence to prevent virtual machines to be compromised as zombies, a new system was proposed as Network Intrusion detection and Countermeasure Selection, Abbreviated as NICE. It uses countermeasures based on reconfigurable virtual network and uses attack graphs. This paper provides survey of techniques of NICE and countermeasures taken to prevent the machines from being compromised as zombies.

References
  1. Cloud Security Alliance, “Top threats tocloudcomputing1.0,”https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf,March2010.
  2. A. Vijayanand B. Joshi,“ Securing Cloud Computing Environment against DDoS Attacks,” Proceedings IEEE International Conference Computer Comm. and Informatics,Jan.2012.
  3. J.B.Joshi, H.Takabiand G. Ahn, “ Security and Privacy Challenges in Cloud Computing Environments, ”IEEE SecurityandPrivacy,vol.8, no.6, pp.Dec.2010.
  4. Z.Duan, P.Chen ,F.Sanchez, Y.Dong ,M.Stephenson and J.Barker, “Detecting Spam Zombies by Monitoring Outgoing Messages,” IEEE Trans. Dependable and Secure Computing,Apr.2012.
  5. G. Gu , P. Porras, V.Yegneswaran, M.Fong , and W.Lee, “Bot Hunter :Detecting Malware Infection through IDS- driven Dialog Correlation,” Proc.16thUSENIXSecurity Symp. (SS’07),pp.12:1-12:16,Aug.2007.
  6. X. Ou , S.Govindavajhala, and A.W. Appel, “Mul VAL:A Logic-Based Network Security Analyzer,” Proc.14th USENIXSecuritySymp.,pp.113-128,2005.
Index Terms

Computer Science
Information Sciences

Keywords

Network security Intrusion detection Countermeasure selection Cloud computing Attack graph Zombie Detection.