Intrusion Detection Techniques for Infrastructure as a Service Cloud
2011pp. 744–751
Citations Over TimeTop 10% of 2011 papers
Abstract
Today, cloud computing is one of the increasingly popular technology where the customer can use the resources of the cloud services providers to perform their tasks and only pay for the resources they use. The customer virtual machines in the cloud are vulnerable to different types of attacks. In this paper we propose techniques for securing customer virtual machines from different types of attacks in the Infrastructure as a Service cloud and describe how this can be achieved in practice. Our model enables to differentiate attack traffic originating from each virtual machine even if multiple virtual machines on a VMM are sharing a single IP address.
Related Papers
- A component-based performance comparison of four hypervisors(2013)
- → CloudVal: A framework for validation of virtualization environment in cloud infrastructure(2011)49 cited
- → Performance comparison of different operating systems in the private cloud with KVM hypervisor using SIGAR framework(2015)5 cited
- → Malicious hypervisor and hidden virtualization of operation systems(2015)2 cited
- → Research and design of inter-communication in DVMM(2009)1 cited