作者
Ravula Arun Kumar, Srikar Goud Konda, Ramesh Karnati
发表日期
2022/3/10
研讨会论文
2022 First International Conference on Artificial Intelligence Trends and Pattern Recognition (ICAITPR)
页码范围
1-6
出版商
IEEE
简介
Any decentralized, biased distributed network is susceptible to the Sybil malicious attack, in which a malicious node masquerades as numerous different nodes, collectively referred to as Sybil nodes, causing the network to become unresponsive. Cloud computing environments are characterized by their loosely linked nature, which means that no node has comprehensive information of the entire system. In order to prevent Sybil attacks in cloud computing systems, it is necessary to detect them as soon as they occur. The network’s ability to function properly A Sybil attacker has the ability to construct. It is necessary to have multiple identities on a single physical device in order to execute a concerted attack on the network or switch between networks identities in order to make the detection process more difficult, and thereby lack of accountability is being promoted throughout the network. The purpose of this study is to …
学术搜索中的文章
RA Kumar, SG Konda, R Karnati - 2022 First International Conference on Artificial …, 2022