Open Access   Article Go Back

Applying Appropriate Security Policies against Threats on Virtual Machines using Multi-Step Approach: A Strategy

E.S. Phalguna Krishna1 , G.Mani Kumar2 , B.Madhu Priya3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1211-1215, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.12111215

Online published on Jul 31, 2018

Copyright © E.S. Phalguna Krishna, G.Mani Kumar, B.Madhu Priya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: E.S. Phalguna Krishna, G.Mani Kumar, B.Madhu Priya, “Applying Appropriate Security Policies against Threats on Virtual Machines using Multi-Step Approach: A Strategy,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1211-1215, 2018.

MLA Style Citation: E.S. Phalguna Krishna, G.Mani Kumar, B.Madhu Priya "Applying Appropriate Security Policies against Threats on Virtual Machines using Multi-Step Approach: A Strategy." International Journal of Computer Sciences and Engineering 6.7 (2018): 1211-1215.

APA Style Citation: E.S. Phalguna Krishna, G.Mani Kumar, B.Madhu Priya, (2018). Applying Appropriate Security Policies against Threats on Virtual Machines using Multi-Step Approach: A Strategy. International Journal of Computer Sciences and Engineering, 6(7), 1211-1215.

BibTex Style Citation:
@article{Krishna_2018,
author = {E.S. Phalguna Krishna, G.Mani Kumar, B.Madhu Priya},
title = {Applying Appropriate Security Policies against Threats on Virtual Machines using Multi-Step Approach: A Strategy},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1211-1215},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2585},
doi = {https://doi.org/10.26438/ijcse/v6i7.12111215}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.12111215}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2585
TI - Applying Appropriate Security Policies against Threats on Virtual Machines using Multi-Step Approach: A Strategy
T2 - International Journal of Computer Sciences and Engineering
AU - E.S. Phalguna Krishna, G.Mani Kumar, B.Madhu Priya
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1211-1215
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
623 375 downloads 215 downloads
  
  
           

Abstract

Security plays the most crucial role in cloud computing. Since the past years, there is a lot of research is going on security. On the other side of the coin, attackers are exploring, developing themselves drastically and exploiting the vulnerabilities in the cloud. Virtualization technology can be defined as backbone of the Cloud computing. Exploiters are taking the advantage of vulnerabilities in Virtual Machines. Thereby launching DDOS attacks, they can able to compromise virtual machines. Services like Saas, IaaS which helps for support end users may get affected and attackers may launch attacks either directly or by using zombies. Generally, Every Data Centre has their own security policies to deal with the security issues. However, in data centers, all the security policies are commonly been applied to the applications irrespective of their category or security threats that it face. The existing approach may take lots of time and wastage of resources. In this paper, we have developed an approach to segregate the applications as per the type of threats (by adapting detection mechanisms) being faced. Based on the zone in which applications are falling, only the relevant security policies will only be applied. This approach is optimized where we can effectively reduce the latency associated with applying security policies.

Key-Words / Index Term

Virtual Machines,Virtual Machine Types

References

[1]. Arbor Application Brief: “The Growing Threat of Application-Layer DDoS Attacks”.2011.
[2]. Zhang Fu, Marina Papatriantafilou, and Philippas Tsigas “Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts” IEEE Transactions On Dependable And Secure Computing, Vol.9, No.3, May/June 2012.
[3]. Shui Yu, Weijia Jia, Song Guo, Yong Xiang, and Feilong Tang ,“Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient” IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 6, June 2012.
[4]. Ke Li, Wanlei Zhou, Ping Li, Jing Hai and Jianwen Liu, “Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics” Third International Conference on Network and System Security pno: 9-17 .2009.
[5]. Ari, B. Hong, E. L. Miller, S. A. Brandt, and D. D. E. Long, “ Modeling , Analysis and Simulation of Flash Crowds on the Internet,” Storage Systems Research Centre Jack Baskin School of Engineering University of California, Santa Cruz Santa Cruz, CA, ech. Rep. UCSC-CRL -03-15, Feb. 28, 2004 .