Back close

To detect and isolate zombie attack in cloud computing

Publication Type : Journal Article

Source : In International Journal of Control Theory and Applications (pp. 227-238), 2016

Campus : Amritapuri

Verified : No

Year : 2016

Abstract : The cloud computing architecture in which third party, virtual machine and cloud service provider are involved for data uploading and downloading. Security is the main issue for cloud computing architecture. Among security attacks zombie attack is the most advance type of attack. This attack reduces network performance in terms of delay and bandwidth consumption. In the zombie attack, some malicious user may join the network which spoof data of the legitimate user and zombie nodes start communicate with virtual machine on the behalf of legitimate user. In this proposed work, the technique based on the strong authentication which has been detect malicious user from the network and isolates them from the cloud architecture.

Cite this Research Publication : Kaur, S., Tomar, A. S., Shankar, S. K., Sharma, M. (2016). To detect and isolate zombie attack in cloud computing. In International Journal of Control Theory and Applications (pp. 227-238).

Admissions Apply Now