Evaluation Security in Virtualization and Hypervisor Architecture’s
Publish place: International Conference on Engineering, Art and Environment
Publish Year: 1393
نوع سند: مقاله کنفرانسی
زبان: English
View: 675
This Paper With 9 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
CEAE01_049
تاریخ نمایه سازی: 14 مرداد 1394
Abstract:
In recent years, there has been a huge trend towards running network intensive applications, such as Internet servers and Cloud-based servicein virtual environment, where multiple virtual machines (VMs) running on the same machine share the machine’s physical and network resources. Also, Cloud Computing and virtualization are inseparable from each other. Virtualization increases efficiency, flexibility and scalability in cloud computing. In other word, it’s the backbone of Cloud Computing. Virtualization in cloud computing is possible due to different virtualization platform such as Kvm, UMLinux, VMware, VirtualBox, Xen. Shared resources are an essential part of cloud computing. Virtualization and multi-tenancy provide a number of advantages for increasing resource utilization and for providing on demand elasticity. However, these cloud features also raise many security concerns related to cloud computing resources. In such environment, the virtual machine monitor (VMM) virtualizes the machine’s resources in terms of CPU, memory, storage, network and I/O devices to allow multiple operating systems running in different VMs to operate and access the network concurrently. In this paper, we propose an architecture and approach for leveraging the virtualization technology at the core of cloud computing to perform intrusion detection security using hypervisor performance metrics.
Keywords:
Authors
Sahar Hemmatian bojnordi
Jihad University of UAST, Bojnourd Branch
Esmaeil Kaffashi
Amirkabir University of Technology (Tehran Polytecnic)
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :