Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud

Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud

Babu Pandipati, Praveen Sam R.
Copyright: © 2022 |Volume: 19 |Issue: 1 |Pages: 32
ISSN: 1545-7362|EISSN: 1546-5004|EISBN13: 9781799893462|DOI: 10.4018/IJWSR.299021
Cite Article Cite Article

MLA

Pandipati, Babu, and Praveen Sam R. "Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud." IJWSR vol.19, no.1 2022: pp.1-32. http://doi.org/10.4018/IJWSR.299021

APA

Pandipati, B. & R., P. S. (2022). Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud. International Journal of Web Services Research (IJWSR), 19(1), 1-32. http://doi.org/10.4018/IJWSR.299021

Chicago

Pandipati, Babu, and Praveen Sam R. "Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud," International Journal of Web Services Research (IJWSR) 19, no.1: 1-32. http://doi.org/10.4018/IJWSR.299021

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In cloud computing, an advanced persistent threat (APT) is a cyber-attack that gains access to a network and remains undetected for some time. As well APTs have proven difficult to detect and protect, in the existing system they fail to analyze the path of an outbreak when the monitor and assign a weight to the nodes. If a path for an outbreak is detected the VM is migrated to hosts that do not account for the overloaded problem and underutilized hosts. In addition to the size of resources occupied by the VM thus here the traffic was increased. This paper proposes the Threat-Path Reckon technique that detects the multiple paths through re-identification and the addition of automatic weight for its neighbor nodes. Based on that weighted paths, the Secured Object Emigration technique invokes a mapping function to migrate the VMs. Finally, the data in the VM are stored in a best-fit distribution, thus it provides security but achieves the search overheads.