SlideShare a Scribd company logo
1 of 7
Download to read offline
REDUCING SECURITY RISKS IN VIRTUAL NETWORKS BY
USING SOFTWARE SWITCHING SOLUTION
B.Ashok
M.Tech 2nd
year, Dept. of CSE, ASCET, Gudur, India
Email: ashok20.86@gmail.com
_____________________________________________________________________________
Cloud computing provides multiple services to the cloud users, particularly in Infrastructure as a service (Ias)
clouds user may install vulnerable software on their virtual machines. Attackers exploit these virtual machines to
compromise as zombie and by using it attacker can perform Distributed denial of service (DDOS) attacks. The
Distributed Denial of service attacks (DDOS) caused by the extreme flow of requests from clients to the cloud
sever at the same time. The DDOS attacks are very much high in the existing Intrusion detection systems. To
overcome these problems a modified approach called Effective Intrusion Detection and reducing Security risks in
Virtual Networks (EDSV) is proposed. It enhances the intrusion detection by closely inspecting the suspicious
cloud traffic and determines the compromised machines A novel attack graph based alert correlation algorithm
is used to detect DDOS attacks and reduced to low level by incorporating access control and software switching
mechanism. It also reduces the infrastructure response time and CPU utilization.
Keywords: cloud computing, Network Security, DDOS, Intruder, Zombie detection
I. INTRODUCTION
Cloud computing is a model for facilitating
convenient, on-demand network access to a
shared pool of configurable computing
resources. It supports three important
models such as platform as a service (Paas),
infrastructure as a service (Iaas) and
software as a service (saas). In IaaS, the
cloud provider supplies a set of virtualized
infrastructural components such as virtual
machines (VMs) and storage on which
customers can build and run applications.
These applications are reside on their VM
and the virtual operating system. Issues such
as trusting the VM image, securing inter-
host communication, hardening hosts are
critical in cloud environment. However,
customers are also very concerned about the
risks of Cloud Computing if not properly
secured, and the loss of direct control over
systems for which they are nonetheless
accountable. The major threats for cloud
system include: Abuse and Nefarious Use of
Cloud Computing, Insecure Application
Programming Interfaces, Malicious Insiders,
Shared Technology Vulnerabilities, Data
Loss/Leakage. This paper focuses on Abuse
and Nefarious Use of Cloud Computing.
SLA is a service level agreement between
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
101
the service provider and the consumer. It
consists the common understanding about
services, priorities, responsibilities,
warranties and guarantees. In cloud
computing environment SLAs are necessary
to control the use of computing resources.
However, patching known security holes in
cloud data centers where cloud user have
access to control their software installed
virtual machines may not work effectively
and that violates service level agreements.
Virtualization is considered to be one of the
important technologies that help abstract
infrastructure and resources to be made
available to clients as isolated VMs. A
hypervisor or VM monitor is a piece of
platform-virtualization software that lets
multiple operating systems run on a host
computer simultaneously. Also this
technology allows generating virtualized
resources for sharing and it also increase the
attack surface. We need a mechanism to
isolate virtual machines and secure
communication between them. This cloud
computing is done with flexible access
control mechanism that governs the control
and sharing capabilities between VMs with
in a host. Compromised machines are one of
the major security threats over the internet.
They are often used to launch a variety of
security attacks such as Distributed denial of
service attack (DDOS), spamming, and
identity theft. Security issues over cloud
computing is definitely one of the major
concerns it prevent the rapid development of
cloud computing.
II. EXISTING SYSTEM
In a cloud system, where the infrastructure is
shared by potentially millions of users,
attackers can explore the vulnerabilities of
the cloud and use of its resource to deploy
attacks in more efficient ways. Existing
system focuses on the detection of
compromised machines that have been
recruited to serve as spam zombies. The
DDOS attacks have been counter measured
by using approaches such as Entropy
Variation method and Puzzle based Game
theoretic strategy. If the number of requests
made by the attacker increases the efficiency
of the entire system will be reduced.
TIME(ms)
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
102
The above fig X-axis specifies the number
of users and Y-axis specifies the time in
milliseconds. The fig shows that attacker
performs five distributed denial of service
attacks in few milliseconds. As a result of
these attacks, client may wait and expect
response from the server but the server does
not register the response according to the
client request. This automatically increases
the infrastructure response time which also
cause increase CPU utilization i.e it is also
increase time taken to create virtual
machines.
III. PROPOSED SYSTEM
In the proposed system, avoiding
compromised virtual machines by using
multiphase distributed vulnerability attack
detection and measurement. Analytical
attack graph model is used for attack
detection and prevention by correlating
attack behavior and suggests effective
countermeasures. Attack graph is
constructed by specifying each node in the
graph represent exploits and each path from
initial node to target node represent
successful attack. EDSV incorporates
software switching solution to isolate
suspicious virtual machine for further
detailed investigation.
Time(ms)
N O.OF USERS
The above fig X-axis specifies the number
of users and Y-axis specifies the time in
milliseconds. The fig shows that the number
of users and duration using the system is
same as in previous approach. In EDSV,
DDOS attacks are effectively prevented
before they incorporate into cloud and
causing further damage to the cloud system.
The client waiting for the response from the
server is delivered in appropriate time. So
that it reduces the infrastructure response
time and also CPU utilization i.e. it is also
cause less time to create virtual profile.
i.Authorization and Access control:
The cloud service provider allows
authenticated users to access a server for
storing and retrieving data. Virtual machines
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
103
allows to store the information about the
client requests like port no,ip address, MAC
address etc .This Intrusion detection
management system detects the alert by
maintaining five tables and timer. The tables
are Account T1, Intruders table T2,
Authenticated client T3, Unauthenticated
client T4, client list T5.T1 is used to check
the client by using MAC address.T2
contains the address of already known
intruders.T3 contains the MAC address of
the clients who are in communication
process, login time and logout time.T4
records the MAC address login and logout
time of clients.T5 contains the MAC address
and login time of all clients.
Alg1:Authentication and Access control
1. Event type (login, logout)
2. If (event Request = login) then
3. int_mac_a = get_ Mac_Address()
//Get the mac address of the client
4. If (int_mac_a is in T2) then //Check
the intruder list
5. (Ignore the request)
6. else if ( int_mac_a is in T3) then
//Check authenticated client list
7. (Ignore login request) and (store
int_mac_a in T2)
8. else if ( int_mac_a is in T5) then
//Check Current Client’s List
9. (Ignore the request)
10. else
11. (Accept the login request) and (Start
communication)
12. end_ if
13. end_ if
14. end_ if
15. end_ if
ii Intrusion detection by using Alert
correlation
Attack analyser performs three major
functions such as attack graph construction,
alert correlation and countermeasure
selection. The process of constructing
scenario attack graph (SAG) consists of
three major functions such as information
gathering, attack graph construction and
exploit path analysis. Attack graph is
constructed by specifying each node in the
graph represent exploits and each path from
initial node to target node represent
successful attack. The Attack analyser also
performs alert correlation and analysis by
constructing Alert correlation graph and
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
104
providing threat information to network
controller. When Attack analyser receives an
alert it checks the alert already exist in the
attack graph and performs countermeasure
selection. It notifies network controller to
deploy countermeasure actions or mitigating
the risk. If the alert is new then attack
analyser performs alert correlation and then
update SAG, ACG .If the alert is a new
vulnerability and not present in attack graph
then attack analyser reconstructing the graph
by adding it.
Algorithm2: Alert correlation algorithm
step1: preparation- In the preparation phase,
all the system and network information is
loaded, the database with alert
classifications is imported, and the attack
graph AG for the network is loaded.
Step 2: Mapping: The mapping function
maps the matching alerts to specific nodes in
the AG. Alert mapping can be done by
determining source, destination of and
classification of alerts.
Step 3: Aggregation: Let alerts A is subset
of A be the set of alert that is supposed to be
aggregated. Let th be a threshold, The alert
aggregation combines alerts that are similar
but where created together in a short
time ,i.e., the difference of the timestamps is
below a certain threshold th.
Step 4: Alert Dependencies: Let Am is a
subset of A be the set of alerts that have been
matched to a node in an AG: The
dependency graph DG is defined by the
matched and aggregated alerts Am as
vertices and the relations between these
alerts as edges.
Step5: Searching: Each path in the alert
dependency graph DG specifies a subset of
alerts that might be part of an attack scenario.
Dependency Graph is used in the last step to
determine the most interesting subsets of
alerts and also the most interesting path in
the alert dependency graph.
iii Software Switching Solution
The network controller is a major
component to supports the programmable
networking capability to realize the virtual
network reconfiguration feature based on the
Open Flow protocol. In EDSV, each cloud
server consists a software switch which is
used as the edge switch for VMs to handle
traffic in and out from VMs. Conceptually
switch function is divided into two pieces
such as control plane and data plane. The
control plane is the core part of switch
which handles the discovery, routing, path
communication and communication with
other switches. The control plane creates a
flow table and it is used by the data plane to
process the incoming packets. Open flow
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
105
protocol lets you delegate the control plane
of all the switches to the central controller
and lets the central software to define the
behaviour of the network.
The network controller is responsible for
collecting network information of current
attack graphs it includes current data paths
on each switch and the detailed flow of
information associated with these paths,
such as TCP/IP and MAC header. The
network controller automatically receives
information about network flow and
topology changes after that it sends the
information to attack analyser to reconstruct
attack graph. We integrate the control
functions for both open flow switch, open
virtual switch so that that allows the cloud
system to set the security and filtering rules
in secure and comprehensive manner. Based
on the security index of Virtual machine and
severity of an alert, countermeasures are
selected and executed by Network controller.
IV. CONCLUSIONS
In this paper, we proposed a solution to
detect DDOS attacks early and preventing
the system from attacks. We have used a
novel alert correlation algorithm which
creates alert correlations and suggests
effective countermeasures. Software
switches based solutions used to improve the
detection accuracy as a result there is an
improvement in the performance of the
cloud with the depletion in the CPU
utilization, Infrastructure response time and
VM creation time. In order to improve the
detection accuracy, hybrid intrusion
detection solutions are needed to be
incorporated and to cover the whole
spectrum of IDS systems in the cloud
system.
References
1. H. Takabi, J. B. Joshi, and G. Ahn,
“Security and privacy challenges in cloud
computing environments,” IEEE Security &
Privacy,vol. 8, no. 6, pp. 24–31, Dec. 2010.
2. B. Joshi, A. Vijayan, and B. Joshi,
“Securing cloud computing environment
against DDoS attacks,” IEEE Int’l Conf.
Computer Communication and Informatics
(ICCCI ’12), Jan. 2012
3. Cloud Security Alliance, “Top threats to
cloud computing v1.0,”
https://cloudsecurityalliance.org/topthreats/
csathreats.v1.0.pdf,March 2010.
4. Z. Duan, P. Chen, F. Sanchez, Y. Dong, M.
Stephenson, and J. Barker, “Detecting spam
zombies by monitoring outgoing messages,”
IEEE Trans. Dependable and Secure
Computing, vol. 9, no. 2, pp. 198–210, Apr.
2012.
5. R. Sadoddin and A. Ghorbani, “Alert
correlation survey: framework and
techniques,” Proc. ACM Int’l Conf. on
Privacy, SecurityAnd Trust: Bridge the Gap
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
106
Between PST Technologies and Business
Services (PST ’06), pp. 37:1–37:10. 2006.
6. S. Roschke, F. Cheng, and C. Meinel, “A
new alert correlation algorithm based on
attack graph,” Computational Intelligence
in Security for Information Systems, LNCS,
vol. 6694, pp. 58–67.Springer, 2011.
7. P. Ammann, D. Wijesekera, and S. Kaushik,
“Scalable, graph based network
vulnerability analysis,” Proc. 9th ACM
Conf. Computer and Comm. Security (CCS
’02), pp. 217-224, 2002.
8. S. H. Ahmadinejad, S. Jalili, and M. Abadi,
“A hybrid model for correlating alerts of
known and unknown attack scenarios and
updating attack graphs,” Computer
Networks, vol. 55, no. 9, pp.2221–2240, Jun.
2011.
9. “Open vSwitch project,”
http://openvswitch.org, May 2012.
10. L. Wang, A. Liu, and S. Jajodia, “Using
attack graphs for correlating, hypothesizing,
and predicting intrusion alerts,” Computer
Communications, vol. 29, no. 15, pp. 2917–
2933, Sep .2006
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
107

More Related Content

What's hot

IJET-V3I1P9
IJET-V3I1P9IJET-V3I1P9
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IJCST - ESRG Journals
 

What's hot (20)

APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROLAPPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phones
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
 
20120130406025
2012013040602520120130406025
20120130406025
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
IJET-V3I1P9
IJET-V3I1P9IJET-V3I1P9
IJET-V3I1P9
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Dr. ritu soni
Dr. ritu soniDr. ritu soni
Dr. ritu soni
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration Testing
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithm
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 

Viewers also liked

Iaetsd ethernet based intelligent security system
Iaetsd ethernet based intelligent security systemIaetsd ethernet based intelligent security system
Iaetsd ethernet based intelligent security system
Iaetsd Iaetsd
 
Iaetsd an efficient way of detecting a numbers in car
Iaetsd an efficient way of detecting a numbers in carIaetsd an efficient way of detecting a numbers in car
Iaetsd an efficient way of detecting a numbers in car
Iaetsd Iaetsd
 
Iaetsd real time event detection and alert system using sensors
Iaetsd real time event detection and alert system using sensorsIaetsd real time event detection and alert system using sensors
Iaetsd real time event detection and alert system using sensors
Iaetsd Iaetsd
 
Iaetsd similarity search in information networks using
Iaetsd similarity search in information networks usingIaetsd similarity search in information networks using
Iaetsd similarity search in information networks using
Iaetsd Iaetsd
 
Iaetsd design and implementation of multiple sic vectors
Iaetsd design and implementation of multiple sic vectorsIaetsd design and implementation of multiple sic vectors
Iaetsd design and implementation of multiple sic vectors
Iaetsd Iaetsd
 
Iaetsd vlsi based implementation of a digital
Iaetsd vlsi based implementation of a digitalIaetsd vlsi based implementation of a digital
Iaetsd vlsi based implementation of a digital
Iaetsd Iaetsd
 
Iaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation withIaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation with
Iaetsd Iaetsd
 
Iaetsd pinpointing performance deviations of subsystems in distributed
Iaetsd pinpointing performance deviations of subsystems in distributedIaetsd pinpointing performance deviations of subsystems in distributed
Iaetsd pinpointing performance deviations of subsystems in distributed
Iaetsd Iaetsd
 
Iaetsd a new multilevel inverter topology for four
Iaetsd a new multilevel inverter topology for fourIaetsd a new multilevel inverter topology for four
Iaetsd a new multilevel inverter topology for four
Iaetsd Iaetsd
 
Iaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell usingIaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell using
Iaetsd Iaetsd
 
Iaetsd modified artificial potential fields algorithm for mobile robot path ...
Iaetsd modified  artificial potential fields algorithm for mobile robot path ...Iaetsd modified  artificial potential fields algorithm for mobile robot path ...
Iaetsd modified artificial potential fields algorithm for mobile robot path ...
Iaetsd Iaetsd
 
Iaetsd classification of lung tumour using
Iaetsd classification of lung tumour usingIaetsd classification of lung tumour using
Iaetsd classification of lung tumour using
Iaetsd Iaetsd
 
Iaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and its
Iaetsd Iaetsd
 
Iaetsd traffic sign recognition for advanced driver
Iaetsd traffic sign recognition for  advanced driverIaetsd traffic sign recognition for  advanced driver
Iaetsd traffic sign recognition for advanced driver
Iaetsd Iaetsd
 
Iaetsd position control of servo systems using pid
Iaetsd position control of servo systems using pidIaetsd position control of servo systems using pid
Iaetsd position control of servo systems using pid
Iaetsd Iaetsd
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensive
Iaetsd Iaetsd
 
Iaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal health
Iaetsd Iaetsd
 
Iaetsd pipelined parallel fft architecture through folding transformation
Iaetsd pipelined parallel fft architecture through folding transformationIaetsd pipelined parallel fft architecture through folding transformation
Iaetsd pipelined parallel fft architecture through folding transformation
Iaetsd Iaetsd
 

Viewers also liked (19)

Iaetsd ethernet based intelligent security system
Iaetsd ethernet based intelligent security systemIaetsd ethernet based intelligent security system
Iaetsd ethernet based intelligent security system
 
Iaetsd an efficient way of detecting a numbers in car
Iaetsd an efficient way of detecting a numbers in carIaetsd an efficient way of detecting a numbers in car
Iaetsd an efficient way of detecting a numbers in car
 
Iaetsd real time event detection and alert system using sensors
Iaetsd real time event detection and alert system using sensorsIaetsd real time event detection and alert system using sensors
Iaetsd real time event detection and alert system using sensors
 
Iaetsd modeling of magnetically
Iaetsd modeling of magneticallyIaetsd modeling of magnetically
Iaetsd modeling of magnetically
 
Iaetsd similarity search in information networks using
Iaetsd similarity search in information networks usingIaetsd similarity search in information networks using
Iaetsd similarity search in information networks using
 
Iaetsd design and implementation of multiple sic vectors
Iaetsd design and implementation of multiple sic vectorsIaetsd design and implementation of multiple sic vectors
Iaetsd design and implementation of multiple sic vectors
 
Iaetsd vlsi based implementation of a digital
Iaetsd vlsi based implementation of a digitalIaetsd vlsi based implementation of a digital
Iaetsd vlsi based implementation of a digital
 
Iaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation withIaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation with
 
Iaetsd pinpointing performance deviations of subsystems in distributed
Iaetsd pinpointing performance deviations of subsystems in distributedIaetsd pinpointing performance deviations of subsystems in distributed
Iaetsd pinpointing performance deviations of subsystems in distributed
 
Iaetsd a new multilevel inverter topology for four
Iaetsd a new multilevel inverter topology for fourIaetsd a new multilevel inverter topology for four
Iaetsd a new multilevel inverter topology for four
 
Iaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell usingIaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell using
 
Iaetsd modified artificial potential fields algorithm for mobile robot path ...
Iaetsd modified  artificial potential fields algorithm for mobile robot path ...Iaetsd modified  artificial potential fields algorithm for mobile robot path ...
Iaetsd modified artificial potential fields algorithm for mobile robot path ...
 
Iaetsd classification of lung tumour using
Iaetsd classification of lung tumour usingIaetsd classification of lung tumour using
Iaetsd classification of lung tumour using
 
Iaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and itsIaetsd survey on cognitive radio networks and its
Iaetsd survey on cognitive radio networks and its
 
Iaetsd traffic sign recognition for advanced driver
Iaetsd traffic sign recognition for  advanced driverIaetsd traffic sign recognition for  advanced driver
Iaetsd traffic sign recognition for advanced driver
 
Iaetsd position control of servo systems using pid
Iaetsd position control of servo systems using pidIaetsd position control of servo systems using pid
Iaetsd position control of servo systems using pid
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensive
 
Iaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal health
 
Iaetsd pipelined parallel fft architecture through folding transformation
Iaetsd pipelined parallel fft architecture through folding transformationIaetsd pipelined parallel fft architecture through folding transformation
Iaetsd pipelined parallel fft architecture through folding transformation
 

Similar to Iaetsd reducing security risks in virtual networks by

Ijsrdv1 i4019
Ijsrdv1 i4019Ijsrdv1 i4019
Ijsrdv1 i4019
ijsrd.com
 

Similar to Iaetsd reducing security risks in virtual networks by (20)

Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
 
Ijsrdv1 i4019
Ijsrdv1 i4019Ijsrdv1 i4019
Ijsrdv1 i4019
 
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUDTHRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKSMAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
IMPROVING DDOS DETECTION IN IOT DEVICES
IMPROVING DDOS DETECTION IN IOT DEVICESIMPROVING DDOS DETECTION IN IOT DEVICES
IMPROVING DDOS DETECTION IN IOT DEVICES
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutions
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
Iaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
Iaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
Iaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
Iaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
Iaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Iaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
Iaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
Iaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
Iaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
Iaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Recently uploaded (20)

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 

Iaetsd reducing security risks in virtual networks by

  • 1. REDUCING SECURITY RISKS IN VIRTUAL NETWORKS BY USING SOFTWARE SWITCHING SOLUTION B.Ashok M.Tech 2nd year, Dept. of CSE, ASCET, Gudur, India Email: ashok20.86@gmail.com _____________________________________________________________________________ Cloud computing provides multiple services to the cloud users, particularly in Infrastructure as a service (Ias) clouds user may install vulnerable software on their virtual machines. Attackers exploit these virtual machines to compromise as zombie and by using it attacker can perform Distributed denial of service (DDOS) attacks. The Distributed Denial of service attacks (DDOS) caused by the extreme flow of requests from clients to the cloud sever at the same time. The DDOS attacks are very much high in the existing Intrusion detection systems. To overcome these problems a modified approach called Effective Intrusion Detection and reducing Security risks in Virtual Networks (EDSV) is proposed. It enhances the intrusion detection by closely inspecting the suspicious cloud traffic and determines the compromised machines A novel attack graph based alert correlation algorithm is used to detect DDOS attacks and reduced to low level by incorporating access control and software switching mechanism. It also reduces the infrastructure response time and CPU utilization. Keywords: cloud computing, Network Security, DDOS, Intruder, Zombie detection I. INTRODUCTION Cloud computing is a model for facilitating convenient, on-demand network access to a shared pool of configurable computing resources. It supports three important models such as platform as a service (Paas), infrastructure as a service (Iaas) and software as a service (saas). In IaaS, the cloud provider supplies a set of virtualized infrastructural components such as virtual machines (VMs) and storage on which customers can build and run applications. These applications are reside on their VM and the virtual operating system. Issues such as trusting the VM image, securing inter- host communication, hardening hosts are critical in cloud environment. However, customers are also very concerned about the risks of Cloud Computing if not properly secured, and the loss of direct control over systems for which they are nonetheless accountable. The major threats for cloud system include: Abuse and Nefarious Use of Cloud Computing, Insecure Application Programming Interfaces, Malicious Insiders, Shared Technology Vulnerabilities, Data Loss/Leakage. This paper focuses on Abuse and Nefarious Use of Cloud Computing. SLA is a service level agreement between INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 101
  • 2. the service provider and the consumer. It consists the common understanding about services, priorities, responsibilities, warranties and guarantees. In cloud computing environment SLAs are necessary to control the use of computing resources. However, patching known security holes in cloud data centers where cloud user have access to control their software installed virtual machines may not work effectively and that violates service level agreements. Virtualization is considered to be one of the important technologies that help abstract infrastructure and resources to be made available to clients as isolated VMs. A hypervisor or VM monitor is a piece of platform-virtualization software that lets multiple operating systems run on a host computer simultaneously. Also this technology allows generating virtualized resources for sharing and it also increase the attack surface. We need a mechanism to isolate virtual machines and secure communication between them. This cloud computing is done with flexible access control mechanism that governs the control and sharing capabilities between VMs with in a host. Compromised machines are one of the major security threats over the internet. They are often used to launch a variety of security attacks such as Distributed denial of service attack (DDOS), spamming, and identity theft. Security issues over cloud computing is definitely one of the major concerns it prevent the rapid development of cloud computing. II. EXISTING SYSTEM In a cloud system, where the infrastructure is shared by potentially millions of users, attackers can explore the vulnerabilities of the cloud and use of its resource to deploy attacks in more efficient ways. Existing system focuses on the detection of compromised machines that have been recruited to serve as spam zombies. The DDOS attacks have been counter measured by using approaches such as Entropy Variation method and Puzzle based Game theoretic strategy. If the number of requests made by the attacker increases the efficiency of the entire system will be reduced. TIME(ms) INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 102
  • 3. The above fig X-axis specifies the number of users and Y-axis specifies the time in milliseconds. The fig shows that attacker performs five distributed denial of service attacks in few milliseconds. As a result of these attacks, client may wait and expect response from the server but the server does not register the response according to the client request. This automatically increases the infrastructure response time which also cause increase CPU utilization i.e it is also increase time taken to create virtual machines. III. PROPOSED SYSTEM In the proposed system, avoiding compromised virtual machines by using multiphase distributed vulnerability attack detection and measurement. Analytical attack graph model is used for attack detection and prevention by correlating attack behavior and suggests effective countermeasures. Attack graph is constructed by specifying each node in the graph represent exploits and each path from initial node to target node represent successful attack. EDSV incorporates software switching solution to isolate suspicious virtual machine for further detailed investigation. Time(ms) N O.OF USERS The above fig X-axis specifies the number of users and Y-axis specifies the time in milliseconds. The fig shows that the number of users and duration using the system is same as in previous approach. In EDSV, DDOS attacks are effectively prevented before they incorporate into cloud and causing further damage to the cloud system. The client waiting for the response from the server is delivered in appropriate time. So that it reduces the infrastructure response time and also CPU utilization i.e. it is also cause less time to create virtual profile. i.Authorization and Access control: The cloud service provider allows authenticated users to access a server for storing and retrieving data. Virtual machines INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 103
  • 4. allows to store the information about the client requests like port no,ip address, MAC address etc .This Intrusion detection management system detects the alert by maintaining five tables and timer. The tables are Account T1, Intruders table T2, Authenticated client T3, Unauthenticated client T4, client list T5.T1 is used to check the client by using MAC address.T2 contains the address of already known intruders.T3 contains the MAC address of the clients who are in communication process, login time and logout time.T4 records the MAC address login and logout time of clients.T5 contains the MAC address and login time of all clients. Alg1:Authentication and Access control 1. Event type (login, logout) 2. If (event Request = login) then 3. int_mac_a = get_ Mac_Address() //Get the mac address of the client 4. If (int_mac_a is in T2) then //Check the intruder list 5. (Ignore the request) 6. else if ( int_mac_a is in T3) then //Check authenticated client list 7. (Ignore login request) and (store int_mac_a in T2) 8. else if ( int_mac_a is in T5) then //Check Current Client’s List 9. (Ignore the request) 10. else 11. (Accept the login request) and (Start communication) 12. end_ if 13. end_ if 14. end_ if 15. end_ if ii Intrusion detection by using Alert correlation Attack analyser performs three major functions such as attack graph construction, alert correlation and countermeasure selection. The process of constructing scenario attack graph (SAG) consists of three major functions such as information gathering, attack graph construction and exploit path analysis. Attack graph is constructed by specifying each node in the graph represent exploits and each path from initial node to target node represent successful attack. The Attack analyser also performs alert correlation and analysis by constructing Alert correlation graph and INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 104
  • 5. providing threat information to network controller. When Attack analyser receives an alert it checks the alert already exist in the attack graph and performs countermeasure selection. It notifies network controller to deploy countermeasure actions or mitigating the risk. If the alert is new then attack analyser performs alert correlation and then update SAG, ACG .If the alert is a new vulnerability and not present in attack graph then attack analyser reconstructing the graph by adding it. Algorithm2: Alert correlation algorithm step1: preparation- In the preparation phase, all the system and network information is loaded, the database with alert classifications is imported, and the attack graph AG for the network is loaded. Step 2: Mapping: The mapping function maps the matching alerts to specific nodes in the AG. Alert mapping can be done by determining source, destination of and classification of alerts. Step 3: Aggregation: Let alerts A is subset of A be the set of alert that is supposed to be aggregated. Let th be a threshold, The alert aggregation combines alerts that are similar but where created together in a short time ,i.e., the difference of the timestamps is below a certain threshold th. Step 4: Alert Dependencies: Let Am is a subset of A be the set of alerts that have been matched to a node in an AG: The dependency graph DG is defined by the matched and aggregated alerts Am as vertices and the relations between these alerts as edges. Step5: Searching: Each path in the alert dependency graph DG specifies a subset of alerts that might be part of an attack scenario. Dependency Graph is used in the last step to determine the most interesting subsets of alerts and also the most interesting path in the alert dependency graph. iii Software Switching Solution The network controller is a major component to supports the programmable networking capability to realize the virtual network reconfiguration feature based on the Open Flow protocol. In EDSV, each cloud server consists a software switch which is used as the edge switch for VMs to handle traffic in and out from VMs. Conceptually switch function is divided into two pieces such as control plane and data plane. The control plane is the core part of switch which handles the discovery, routing, path communication and communication with other switches. The control plane creates a flow table and it is used by the data plane to process the incoming packets. Open flow INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 105
  • 6. protocol lets you delegate the control plane of all the switches to the central controller and lets the central software to define the behaviour of the network. The network controller is responsible for collecting network information of current attack graphs it includes current data paths on each switch and the detailed flow of information associated with these paths, such as TCP/IP and MAC header. The network controller automatically receives information about network flow and topology changes after that it sends the information to attack analyser to reconstruct attack graph. We integrate the control functions for both open flow switch, open virtual switch so that that allows the cloud system to set the security and filtering rules in secure and comprehensive manner. Based on the security index of Virtual machine and severity of an alert, countermeasures are selected and executed by Network controller. IV. CONCLUSIONS In this paper, we proposed a solution to detect DDOS attacks early and preventing the system from attacks. We have used a novel alert correlation algorithm which creates alert correlations and suggests effective countermeasures. Software switches based solutions used to improve the detection accuracy as a result there is an improvement in the performance of the cloud with the depletion in the CPU utilization, Infrastructure response time and VM creation time. In order to improve the detection accuracy, hybrid intrusion detection solutions are needed to be incorporated and to cover the whole spectrum of IDS systems in the cloud system. References 1. H. Takabi, J. B. Joshi, and G. Ahn, “Security and privacy challenges in cloud computing environments,” IEEE Security & Privacy,vol. 8, no. 6, pp. 24–31, Dec. 2010. 2. B. Joshi, A. Vijayan, and B. Joshi, “Securing cloud computing environment against DDoS attacks,” IEEE Int’l Conf. Computer Communication and Informatics (ICCCI ’12), Jan. 2012 3. Cloud Security Alliance, “Top threats to cloud computing v1.0,” https://cloudsecurityalliance.org/topthreats/ csathreats.v1.0.pdf,March 2010. 4. Z. Duan, P. Chen, F. Sanchez, Y. Dong, M. Stephenson, and J. Barker, “Detecting spam zombies by monitoring outgoing messages,” IEEE Trans. Dependable and Secure Computing, vol. 9, no. 2, pp. 198–210, Apr. 2012. 5. R. Sadoddin and A. Ghorbani, “Alert correlation survey: framework and techniques,” Proc. ACM Int’l Conf. on Privacy, SecurityAnd Trust: Bridge the Gap INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 106
  • 7. Between PST Technologies and Business Services (PST ’06), pp. 37:1–37:10. 2006. 6. S. Roschke, F. Cheng, and C. Meinel, “A new alert correlation algorithm based on attack graph,” Computational Intelligence in Security for Information Systems, LNCS, vol. 6694, pp. 58–67.Springer, 2011. 7. P. Ammann, D. Wijesekera, and S. Kaushik, “Scalable, graph based network vulnerability analysis,” Proc. 9th ACM Conf. Computer and Comm. Security (CCS ’02), pp. 217-224, 2002. 8. S. H. Ahmadinejad, S. Jalili, and M. Abadi, “A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs,” Computer Networks, vol. 55, no. 9, pp.2221–2240, Jun. 2011. 9. “Open vSwitch project,” http://openvswitch.org, May 2012. 10. L. Wang, A. Liu, and S. Jajodia, “Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts,” Computer Communications, vol. 29, no. 15, pp. 2917– 2933, Sep .2006 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 107