Tag Archives: Security

Cloud Operating System Using Node.js – #IJSRD

The idea behind Cloud Operating System is that the whole system lives in the web browser. The client must have only a web browser to work with Cloud Operating System and all its applications. This applies to for both modern and obsolete PC’s An Open Source Platform designed to hold a wide variety of Web Applications. Cloud Operating System would be a new definition of an Operating System, where everything inside it can be accessed from everywhere inside a Network. All you need to do is login into your Cloud Operating System server with a normal Internet Browser, and you have access to your personal desktop, with your applications, documents, music, movies… just like you left it. Cloud Operating System would let you to upload your files and work with them no matter where you are.

#IJSRD #Research. . . ! ! ! Let`s Do IT. . .

for more information click here. . .

IJSRD Research Paper For Security Privacy in system

Call For Journal Paper and Publishing :

WordPress

IJSRD HOME

 

Research Paper On :

PRIVACY PRESERVING AGAINST NETWORK

INTRUSION DETECTION IN VIRTUAL NETWORK SYSTEM

———————————————————–

Authors :

SHRUTHI S , RNS INSTITUTE OF TECHNOLOGY

 

Description :

Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service(DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnerability scanning, and compromising identified vulnerable virtual machines as zombies, and finally DDoS attacks through the compromised zombies. Within the cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is extremely difficult. This is because cloud users may install vulnerable applications on their virtual machines. To prevent vulnerable virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, which is built on attack graph based analytical models and reconfigurable virtual network-based countermeasures.

 

For more Details About Above Blog

you can Visit on Below Links :