Effective way to defend the hypervisor attacks in cloud computing
Nowadays, the organizations are emphasizing on the security and resilient aspect of the cloud computing to protect the privacy and confidentiality of their data information. However, the hypervisor attack remains a hot issue by the cloud user even though enormous research have accomplished to i...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2017
|
Subjects: | |
Online Access: | http://ir.unimas.my/id/eprint/16230/1/Effective%20Way%20to%20Defend%20the%20Hypervisor%20%28abstract%29.pdf http://ir.unimas.my/id/eprint/16230/ http://ieeexplore.ieee.org/document/7905282/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.unimas.ir.16230 |
---|---|
record_format |
eprints |
spelling |
my.unimas.ir.162302022-09-29T03:35:51Z http://ir.unimas.my/id/eprint/16230/ Effective way to defend the hypervisor attacks in cloud computing Muhammad Shahid, Dildar Nayeem, Khan Johari, Abdullah Adnan, Shahid Khan T Technology (General) Nowadays, the organizations are emphasizing on the security and resilient aspect of the cloud computing to protect the privacy and confidentiality of their data information. However, the hypervisor attack remains a hot issue by the cloud user even though enormous research have accomplished to inhibit the vulnerabilities in the virtualized cloud environment.Therefore, we have proposed the Virtual Machines and Hypervisor Intrusion Detection System, VMHIDS as our technique in detecting and preventing the hypervisor attacks in the virtualized cloud environment. The VMHIDS has adopted several features from the other techniques by inspecting the tasks frequently which then prevent suspicious event occur. Through the VMHIDS, the hypervisor attack is mitigated. IEEE 2017 Article PeerReviewed text en http://ir.unimas.my/id/eprint/16230/1/Effective%20Way%20to%20Defend%20the%20Hypervisor%20%28abstract%29.pdf Muhammad Shahid, Dildar and Nayeem, Khan and Johari, Abdullah and Adnan, Shahid Khan (2017) Effective way to defend the hypervisor attacks in cloud computing. 2017 2nd International Conference on Anti-Cyber Crimes (ICACC). pp. 154-159. ISSN 978-1-5090-5814-3 http://ieeexplore.ieee.org/document/7905282/ DOI: 10.1109/Anti-Cybercrime.2017.7905282 |
institution |
Universiti Malaysia Sarawak |
building |
Centre for Academic Information Services (CAIS) |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Sarawak |
content_source |
UNIMAS Institutional Repository |
url_provider |
http://ir.unimas.my/ |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Muhammad Shahid, Dildar Nayeem, Khan Johari, Abdullah Adnan, Shahid Khan Effective way to defend the hypervisor attacks in cloud computing |
description |
Nowadays, the organizations are emphasizing
on the security and resilient aspect of the cloud
computing to protect the privacy and confidentiality of
their data information. However, the hypervisor attack
remains a hot issue by the cloud user even though
enormous research have accomplished to inhibit the
vulnerabilities in the virtualized cloud
environment.Therefore, we have proposed the Virtual
Machines and Hypervisor Intrusion Detection System,
VMHIDS as our technique in detecting and preventing
the hypervisor attacks in the virtualized cloud
environment. The VMHIDS has adopted several features
from the other techniques by inspecting the tasks
frequently which then prevent suspicious event occur.
Through the VMHIDS, the hypervisor attack is
mitigated. |
format |
Article |
author |
Muhammad Shahid, Dildar Nayeem, Khan Johari, Abdullah Adnan, Shahid Khan |
author_facet |
Muhammad Shahid, Dildar Nayeem, Khan Johari, Abdullah Adnan, Shahid Khan |
author_sort |
Muhammad Shahid, Dildar |
title |
Effective way to defend the hypervisor attacks in cloud computing |
title_short |
Effective way to defend the hypervisor attacks in cloud computing |
title_full |
Effective way to defend the hypervisor attacks in cloud computing |
title_fullStr |
Effective way to defend the hypervisor attacks in cloud computing |
title_full_unstemmed |
Effective way to defend the hypervisor attacks in cloud computing |
title_sort |
effective way to defend the hypervisor attacks in cloud computing |
publisher |
IEEE |
publishDate |
2017 |
url |
http://ir.unimas.my/id/eprint/16230/1/Effective%20Way%20to%20Defend%20the%20Hypervisor%20%28abstract%29.pdf http://ir.unimas.my/id/eprint/16230/ http://ieeexplore.ieee.org/document/7905282/ |
_version_ |
1745566033323753472 |
score |
13.214268 |