Biblio
Filters: Keyword is VM [Clear All Filters]
ARDefense: DDoS Detection and Prevention Using NFV and SDN. 2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). :236–241.
.
2020. Network Function Virtualization or NFV gives numerous advantages over the conventional networking techniques by incorporating distinctive features of a network over the virtual machine (VM). It decreases capital and operational costs to give more noteworthy adaptability and flexibility. But all of these advantages come at the expense of the intrinsic system vulnerabilities because of specific sorts of cyber attacks like the Distributed Denial of Service (DDoS) attack. With the increased number of layers in NFV, it becomes easier for an attacker to execute DDoS attack. This study indicates a new model for mitigating the effects of DDoS attacks on NFV. The model has been designed specifically for the individual users especially gamers and online streamers who become victim of DDoS attack on adaily basis. However, the method can be used for a online service like a website in general as well after making certain changes which have been discussed in detail. ARDefense usually performs server migration and IP spoofing when it detects a DDoS attack on the application layer. Effectiveness of ARDefense was tested by measuring load migration and IP spoofing processing time.
An authorized security middleware for managing on demand infrastructure in cloud. 2017 International Conference on Intelligent Computing and Control (I2C2). :1–5.
.
2017. Recent increases in the field of infrastructure has led to the emerging of cloud computing a virtualized computing platform. This technology provides a lot of pros like rapid elasticity, ubiquitous network access and on-demand access etc. Compare to other technologies cloud computing provides many essential services. As the elasticity and scalability increases the chance for vulnerability of the system is also high. There are many known and unknown security risks and challenges present in this environment. In this research an environment is proposed which can handle security issues and deploys various security levels. The system handles the security of various infrastructure like VM and also handles the Dynamic infrastructure request control. One of the key feature of proposed approach is Dual authorization in which all account related data will be authorized by two privileged administrators of the cloud. The auto scalability feature of the cloud is be made secure for on-demand service request handling by providing an on-demand scheduler who will process the on-demand request and assign the required infrastructure. Combining these two approaches provides a secure environment for cloud users as well as handle On-demand Infrastructure request.