Detection of Colluded Black-hole and Grey-hole attacks in Cloud Computing

09/07/2020
by   Divyasree I R, et al.
0

The availability of the high-capacity network, massive storage, hardware virtualization, utility computing, service-oriented architecture leads to high accessibility of cloud computing. The extensive usage of cloud resources causes oodles of security controversies. Black-hole Gray-hole attacks are the notable cloud network defenseless attacks while they launched easily but difficult to detect. This research work focuses on proposing an efficient integrated detection method for individual and collusion attacks in cloud computing. In the individual attack detection phase, the forwarding ratio metric is used for differentiating the malicious node and normal nodes. In the collusion attack detection phase, the malicious nodes are manipulated the encounter records for escaping the detection process. To overcome this user, fake encounters are examined along with appearance frequency, and the number of messages exploits abnormal patterns. The simulation results shown in this proposed system detect with better accuracy.

READ FULL TEXT
research
11/22/2017

Formal Analysis of an Authentication Protocol Against External Cloud-Based Denial-of-Service (DoS) Attack

The Denial-of-service (DoS) attack is considered one of the largest thre...
research
06/20/2022

The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud

The financial crisis made companies around the world search for cheaper ...
research
05/25/2023

FIDS: Fuzzy Intrusion Detection System for simultaneous detection of DoS/DDoS attacks in Cloud computing

In recent times, I've encountered a principle known as cloud computing, ...
research
04/11/2019

On Machine Learning DoS Attack Identification from Cloud Computing Telemetry

The detection of Denial of Service (DoS) attacks remains a challenge for...
research
05/31/2019

Comparative Analysis of State-of-the-Art EDoS Mitigation Techniques in Cloud Computing Environment

A new variant of the DDoS attack, called Economic Denial of Sustainabili...
research
04/08/2021

Escape the Fake: Introducing Simulated Container-Escapes for Honeypots

In the field of network security, the concept of honeypots is well estab...

Please sign up or login with your details

Forgot password? Click here to reset