International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 141 | Views: 151

Research Paper | Computer Science & Engineering | India | Volume 8 Issue 2, February 2019

Secure: Self-Protection Approach in Cloud Resource Management

Sangeetha G M | Lavanya S [3] | Prashanth [37]

Abstract: Cloud computing is a modern technology that increase application potentialities in terms of functioning, elastic resource management and collaborative execution approach. Cloud resource management requires complex policies and decisions for multi-objective optimization. It is challenging - the complexity of the system makes it impossible to have accurate global state information. Affected by unpredictable interactions with the environment, e. g. , system failures, attacks. Cloud service providers are faced with large fluctuating loads which challenge the claim of cloud elasticity. This paper focuses on a self-protecting mechanism i. e. , the property of autonomic computing was proposed to make the cloud self-protected without human intervention from intrusions and attacks. The architecture of self-protecting of cloud was presented and describes the basic interaction and functionality of each component of architecture. Self-protection is the ability of a computing system to defend itself against threats and intrusions. A self-protection component aids in distinguishing and recognizing intimidating behaviour and reacts autonomously to protect itself against malicious attacks. This paper proposes a Self-protection approach in cloud Resource management (SECURE) approach for dealing with security attacks. SECURE can create new signatures automatically and provide security against DDoS, Probing, U2R, R2L and DoS security attacks. SECURE continuously monitors security attacks during the execution of workloads, performs analysis to understand alerts in the case of security attacks, makes a plan to perform required actions to manage threats, and executes the action. Security agents (sensors) are created on SVM as an anomaly detector. SECURE increases the security of cloud-based services and increases intrusion detection rate if the same threat arrives again

Keywords: security attacks, cloud, resource management, zero-day attack, self-protection approach

Edition: Volume 8 Issue 2, February 2019,

Pages: 1313 - 1318

How to Download this Article?

Type Your Email Address below to Download the Article PDF

How to Cite this Article?

Sangeetha G M, Lavanya S, Prashanth, "Secure: Self-Protection Approach in Cloud Resource Management", International Journal of Science and Research (IJSR), Volume 8 Issue 2, February 2019, pp. 1313-1318,

Similar Articles with Keyword 'security attacks'

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh [2] | Vaibhav Pandey

Share this Article

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana | Sandeep Gupta [2]

Share this Article