IMPROVING VIRTUAL MACHINE SECURITY THROUGH INTELLIGENT INTRUSION DETECTION SYSTEM
Journal Title: Indian Journal of Computer Science and Engineering - Year 2015, Vol 6, Issue 2
Abstract
Virtualization is the key feature of cloud computing which facilitates sharing of common resources among cloud users. As cloud computing is a shared facility and accessed remotely, it is vulnerable to various attacks. The shared resources may be exploited by the attackers through vulnerabilities. Virtualization technology is implemented by instantiating a virtual machine to each cloud user based on their requirements. Many virtual machines are instantiated on a single physical infrastructure. Although this virtualization technology is more beneficent for the users by means of low cost and for service providers by means of better utilization, it has several risks, in which security is the major one. Benefits of virtualization go beyond the cost savings. By better planning and management virtualization risk can be mitigated. The proposed work secures virtual machines by creating VM profiles, packet monitoring and by conducting periodic centralized vulnerability scans. It is consistent because both signature based and anomaly based IDS are combined. It is efficient because only the VMs affected by infected packets are scanned for vulnerability.
Authors and Affiliations
Ambikavathi C , Dr. S. K. Srivatsa
Countering the DDoS Attacks for a Secured Web Service
Web services are the most widely used technology today. SOAP messages are the building blocks of web services. Since web services mostly deal with confidential data they must be protected from intruders. Intruders can be...
Different Views of Software Agent Paradigm
Agent modelling in software engineering is a relatively young area, and there are, as yet, no standard methodologies, development tools, or software architectures. Although our work is emphasized on to represent the agen...
TEXT MINING USING KEYPHRASE EXTRACTION
Text mining is powerful tool to find useful and needed information from huge data set. For context based text mining, keyphrases are used. Keyphrases provide brief summary about the contents of documents. In document clu...
MOVING MACHINE TRANSLATION SYSTEM TO WEB
The paper presents an overview of an online system based on Punjabi to Hindi Machine translation system. The implementation of the system is roughly divided into two parts: the client side and the server side. On the cli...
PROPERTIES AND APPROACH OF CRYPTOGRAPHIC HASH ALGORITHMS
The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. An overview is given...