{"title":"基于威胁路径估计的云中高级持续威胁的口令块算法","authors":"Babu Pandipati, R. P. Sam","doi":"10.4018/ijwsr.299021","DOIUrl":null,"url":null,"abstract":"In cloud computing, an advanced persistent threat (APT) is a cyber-attack that gains access to a network and remains undetected for some time. As well APTs have proven difficult to detect and protect, in the existing system they fail to analyze the path of an outbreak when the monitor and assign a weight to the nodes. If a path for an outbreak is detected the VM is migrated to hosts that do not account for the overloaded problem and underutilized hosts. In addition to the size of resources occupied by the VM thus here the traffic was increased. This paper proposes the Threat-Path Reckon technique that detects the multiple paths through re-identification and the addition of automatic weight for its neighbor nodes. Based on that weighted paths, the Secured Object Emigration technique invokes a mapping function to migrate the VMs. Finally, the data in the VM are stored in a best-fit distribution, thus it provides security but achieves the search overheads.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"17 1","pages":"1-32"},"PeriodicalIF":0.8000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud\",\"authors\":\"Babu Pandipati, R. P. Sam\",\"doi\":\"10.4018/ijwsr.299021\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In cloud computing, an advanced persistent threat (APT) is a cyber-attack that gains access to a network and remains undetected for some time. As well APTs have proven difficult to detect and protect, in the existing system they fail to analyze the path of an outbreak when the monitor and assign a weight to the nodes. If a path for an outbreak is detected the VM is migrated to hosts that do not account for the overloaded problem and underutilized hosts. In addition to the size of resources occupied by the VM thus here the traffic was increased. This paper proposes the Threat-Path Reckon technique that detects the multiple paths through re-identification and the addition of automatic weight for its neighbor nodes. Based on that weighted paths, the Secured Object Emigration technique invokes a mapping function to migrate the VMs. Finally, the data in the VM are stored in a best-fit distribution, thus it provides security but achieves the search overheads.\",\"PeriodicalId\":54936,\"journal\":{\"name\":\"International Journal of Web Services Research\",\"volume\":\"17 1\",\"pages\":\"1-32\"},\"PeriodicalIF\":0.8000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Web Services Research\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.4018/ijwsr.299021\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Web Services Research","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.4018/ijwsr.299021","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud
In cloud computing, an advanced persistent threat (APT) is a cyber-attack that gains access to a network and remains undetected for some time. As well APTs have proven difficult to detect and protect, in the existing system they fail to analyze the path of an outbreak when the monitor and assign a weight to the nodes. If a path for an outbreak is detected the VM is migrated to hosts that do not account for the overloaded problem and underutilized hosts. In addition to the size of resources occupied by the VM thus here the traffic was increased. This paper proposes the Threat-Path Reckon technique that detects the multiple paths through re-identification and the addition of automatic weight for its neighbor nodes. Based on that weighted paths, the Secured Object Emigration technique invokes a mapping function to migrate the VMs. Finally, the data in the VM are stored in a best-fit distribution, thus it provides security but achieves the search overheads.
期刊介绍:
The International Journal of Web Services Research (IJWSR) is the first refereed, international publication featuring the latest research findings and industry solutions involving all aspects of Web services technology. This journal covers advancements, standards, and practices of Web services, as well as identifies emerging research topics and defines the future of Web services on grid computing, multimedia, and communication. IJWSR provides an open, formal publication for high quality articles developed by theoreticians, educators, developers, researchers, and practitioners for those desiring to stay abreast of challenges in Web services technology.