Identifying and Isolating Zombie Attack in Cloud Computing

Main Article Content

Peter Awon-natemi Agbedemnab
Salifu Abdul-Mumin
Zakaria Abdulrahim

Abstract

The cloud computing architecture is a berth in which third party, virtual machine and cloud service providers are involved in data uploading and downloading. A major challenge in this architecture, however, is the security of the data as there exist various forms of attacks from malicious people
and devices. Among these security attacks, the zombie attack is the most advance type of attack. The zombie attack reduces network performance in terms of delay and bandwidth consumption. With zombie attack, some malicious users may join the network which, in turn takes off the data of legitimate users and at the same time enable zombie nodes to communicate with a virtual machine on behalf of the legitimate user. In this paper, a technique based on strong authentication which, is able to detect malicious users from a network and isolates them from the cloud architecture is proposed.

Keywords:
Authentication, cloud computing, security, malicious user, virtual machine, zombie attack.

Article Details

How to Cite
Agbedemnab, P. A.- natemi, Abdul-Mumin, S., & Abdulrahim, Z. (2020). Identifying and Isolating Zombie Attack in Cloud Computing. Asian Journal of Research in Computer Science, 6(2), 46-56. https://doi.org/10.9734/ajrcos/2020/v6i230157
Section
Original Research Article

References

Frederick R. Carlson. Security analysis of cloud computing; 2014.

Anurag Singh Tomar. Energy studies, and Shashi Kant Shankar. to detect and isolate zombie attack in cloud computing; 2017.

Udaya Tupakula, Vijay Varadharajan, Naveen Akku. Intrusion detection techniques for infrastructure as a service
55 cloud. Proceedings - IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, DASC. 2011;744751.

Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan. A survey on security issues
and solutions at different layers of cloud computing. Journal of Supercomputing. 2013;63(2):561592.

Nelson Gonzalez, Charles Miers, Fernando Red, Marcos Simpl. Open access a quantitative analysis of current security concerns and solutions for cloud computing. 2012;118.

Keiko Hashizume, David G. Rosado, Eduardo Fernandez-Medina, Eduardo B. Fernandez. An analysis of security issues for cloud computing. Journal of Internet Services and Applications. 2013;4(1):113.

Nimmy K, Sethumadhavan M. Novel mutual authentication protocol for cloud computing using secret sharing and steganography. 5th International Conference on the
Applications of Digital Information and Web Technologies, ICADIWT 2014. 2014;5(2):101106.

Tharam Dillon, Chen Wu, Elizabeth Chang. Cloud computing: Issues and challenges. Proceedings - International Conference on Advanced Information Networking and Applications, AINA. 2010;2733.