IMPROVING VIRTUAL MACHINE SECURITY THROUGH INTELLIGENT INTRUSION DETECTION SYSTEM
Journal Title: Indian Journal of Computer Science and Engineering - Year 2015, Vol 6, Issue 2
Abstract
Virtualization is the key feature of cloud computing which facilitates sharing of common resources among cloud users. As cloud computing is a shared facility and accessed remotely, it is vulnerable to various attacks. The shared resources may be exploited by the attackers through vulnerabilities. Virtualization technology is implemented by instantiating a virtual machine to each cloud user based on their requirements. Many virtual machines are instantiated on a single physical infrastructure. Although this virtualization technology is more beneficent for the users by means of low cost and for service providers by means of better utilization, it has several risks, in which security is the major one. Benefits of virtualization go beyond the cost savings. By better planning and management virtualization risk can be mitigated. The proposed work secures virtual machines by creating VM profiles, packet monitoring and by conducting periodic centralized vulnerability scans. It is consistent because both signature based and anomaly based IDS are combined. It is efficient because only the VMs affected by infected packets are scanned for vulnerability.
Authors and Affiliations
Ambikavathi C , Dr. S. K. Srivatsa
DEVELOPING A SECURITY PROTOCOL FOR A WIRELESS COMPUTER VIRTUAL LABORATORY (WCVLAB)
For a Virtual Computer Laboratory (VCLAB) to operate effectively within a Wireless intranet setup, a lot of protocols are employed to function. This write-up is aimed at developing a protocol to secure a Wireless Compute...
SURVEY OF PACKET DROPPING ATTACK IN MANET
Mobile Ad-hoc NETwork (MANET) is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can c...
Ranking Techniques for Social Networking Sites based on Popularity
Web contains large number of information in it. Extracting necessary information from the web becomes difficult task. Search engines help to retrieve information from the web. But the information retrieval by the search...
MINING OF ECG SIGNAL FOR NEW DIAGNOSTIC INFORMATION
This paper investigates a technique, which extracts new features having potentiality for giving more discriminatory clues from simple ECG (Electrocardiogram) signals. The extracted feature parameters, Average RR Signal M...
CLOPINIONMINER: OPINION TARGET EXTRACTION IN A CROSSLANGUAGE SCENARIO
In almost every e-Commerce industry today reviews are essential for both customers as well as the company. Reviews help the customers to sort out the right products and choose the ones that they find best. On the other h...