Downloads
Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture
Authors
Abstract
The cloud computing is the architecture in which virtual machine, cloudlets, and data centers are involved in communication. In the network, malicious nodes are responsible to trigger various types of active and passive attacks which reduce network performance in terms of various parameters. In this work, technique will be proposed for the detection and isolation of malicious nodes from the network. the malicious nodes are responsible to trigger virtual side channel attack in the network.
Article Details
Published
2017-07-13
Issue
Section
Articles
How to Cite
Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture. (2017). International Journal of Engineering and Computer Science, 6(7). http://www.ijecs.in/index.php/ijecs/article/view/2823