Identifying and Isolating Zombie Attack in Cloud Computing

Agbedemnab, Peter Awon-natemi and Abdul-Mumin, Salifu and Abdulrahim, Zakaria (2020) Identifying and Isolating Zombie Attack in Cloud Computing. Asian Journal of Research in Computer Science, 6 (2). pp. 46-56. ISSN 2581-8260

[thumbnail of Agbedemnab622020AJRCOS62109.pdf] Text
Agbedemnab622020AJRCOS62109.pdf - Published Version

Download (346kB)

Abstract

The cloud computing architecture is a berth in which third party, virtual machine and cloud service providers are involved in data uploading and downloading. A major challenge in this architecture, however, is the security of the data as there exist various forms of attacks from malicious people
and devices. Among these security attacks, the zombie attack is the most advance type of attack. The zombie attack reduces network performance in terms of delay and bandwidth consumption. With zombie attack, some malicious users may join the network which, in turn takes off the data of legitimate users and at the same time enable zombie nodes to communicate with a virtual machine on behalf of the legitimate user. In this paper, a technique based on strong authentication which, is able to detect malicious users from a network and isolates them from the cloud architecture is proposed.

Item Type: Article
Subjects: Eurolib Press > Computer Science
Depositing User: Managing Editor
Date Deposited: 09 Mar 2023 07:23
Last Modified: 07 Feb 2024 04:33
URI: http://info.submit4journal.com/id/eprint/1383

Actions (login required)

View Item
View Item