Secure Network ID and Attack Measure Count in Virtual Systems

Provided by: International Journal for Advance Research in Engineering and Technology (IJARET)
Topic: Security
Format: PDF
In past few years, cloud computing security service is most important issue that has attracted a lot of research and development effort. Mostly, attackers can explore vulnerabilities of a cloud services and compromise virtual machines to deploy further large-scale Denial-of-Service (DoS) attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnerability scanning, and compromising identifies vulnerable zombies, and attacks through the compromised zombies. Within the cloud service, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is very difficult.

Find By Topic