Volume : 3, Issue : 2, February - 2014

Detection of Vulnerabilities Using ACO Algorithm in Cloud Computing

Mr. Krishnakumar L, Ms. Nisha Mariam Varughese

Abstract :

Security in open network is one of the major challenges with concerns such as Internet worms, Botnet, Phishing and Flooding attacks. To address the security problems collaborative network security management system is introduced with collaborative Unified Threat Management (UTM), traffic prober and cloud based security center. The security center can instruct each collaborative UTM and prober to collect raw traffic and this huge traffic is given to the data center which classifies the data in parallel. Security center will deeply analyze the classified data and generates new security rules. These security rules are carried out by collaborative UTM and the feedback events of such rules are given back to the security center. The cloud storage is used to store the huge amount of internet traffic data and then processing it with cloud computing platform to detect the malicious attacks. Security center analyze the data and when any attack is detected it will generate new rules. These rules are given to the network and feedback is evaluated. Then it will remove the invalid rules to make the system more efficient and reliable.

Keywords :


Cite This Article:

Mr. Krishnakumar L, Ms. Nisha Mariam Varughese Detection of Vulnerabilities Using ACO Algorithm in Cloud Computing Global Journal For Research Analysis, Vol:III, Issue:II Feb 2014


Article No. : 1


Number of Downloads : 1


References :