Publication Type : Journal Article
Source : In International Journal of Control Theory and Applications (pp. 227-238), 2016
Campus : Amritapuri
Verified : No
Year : 2016
Abstract : The cloud computing architecture in which third party, virtual machine and cloud service provider are involved for data uploading and downloading. Security is the main issue for cloud computing architecture. Among security attacks zombie attack is the most advance type of attack. This attack reduces network performance in terms of delay and bandwidth consumption. In the zombie attack, some malicious user may join the network which spoof data of the legitimate user and zombie nodes start communicate with virtual machine on the behalf of legitimate user. In this proposed work, the technique based on the strong authentication which has been detect malicious user from the network and isolates them from the cloud architecture.
Cite this Research Publication : Kaur, S., Tomar, A. S., Shankar, S. K., Sharma, M. (2016). To detect and isolate zombie attack in cloud computing. In International Journal of Control Theory and Applications (pp. 227-238).