2016
DOI: 10.5120/ijca2016912185
|View full text |Cite
|
Sign up to set email alerts
|

Virtual Network Connection Technique to Control Device Remotely and Securely

Abstract: Cloud security has been an important area of research nowadays. The vulnerabilities of cloud system can be easily explored by any attacker and compromise these virtual machines to deploy DDos i.e. Distributed denial of service attack which involves multi step exploitation, compromising virtual machines as zombies, low frequency vulnerability scanning and lastly DDos attack through the zombies. In Infrastructure-as-a-service (Iaas) clouds, detection of zombies is extremely difficult. Hence to prevent virtual ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 1 publication
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?