Cloud Based Security Center: To Protect Networking Attack by Forensic Scrutiny
Journal: International Journal of Scientific Engineering and Technology (IJSET) (Vol.3, No. 3)Publication Date: 2014-03-01
Authors : M. Sankara Mahalingam M. K. Nagarajan;
Page : 280-284
Keywords : Cloud Computing; Collaborative Network Security System; Computer forensics; Anti-Phishing; Hadoop File System; Eucalyptus.;
Abstract
As Internet, security problems are still a big challenge as there are many security events occurred. The underground economics based on Internet Scam and Fraud is booming. These attackers initiate more and more E-crime attacks and abuse, such as Spams, Phishing attack, Internet worms etc. Firewalls, Intrusion Detection System (IDS) and Anti-Virus Gateway are now widely deployed in edge-network to protect end-systems from the attacks. When the malicious attacks have fixed patterns, they can be easily identified and matching these patterns. For example, the Distributed Denial of service (DDoS) contains very few, if any, signatures strings to identify. Nowadays DDoS attacks are likely launched by a large volume of botswhich forms a Botnet controlled by bot master. The bots are commanded to generate attack new victim machine and enlarge botnet. The bots also commanded to conduct other issues such as disseminating spam or launching Distributed Denial-of-Service (DDoS) attacks to victim hosts. To countermeasure botnet, secure overlay is proposed. To prevent distributed attacks, collaboration is needed, so we used Collaborative Network SecurityManagement System (CNSMS).
Other Latest Articles
- Error Detection and Correction by using Different Set Codes for Memory Applications
- Comparative Study of Ambient Air Quality around Chandrapur
- Characterrization Al-4.5%Cu Alloy and Study of Wear Resistance
- AN EFFICIENT METHOD TO AVOID FALSE VOTING USING SMS VOTING APPROACH?
- A Wavelet Transform Based Secure Data Transfer Using Blowfish Algorithm?
Last modified: 2014-03-04 16:35:11