Effective way to defend the hypervisor attacks in cloud computing

Nowadays, the organizations are emphasizing on the security and resilient aspect of the cloud computing to protect the privacy and confidentiality of their data information. However, the hypervisor attack remains a hot issue by the cloud user even though enormous research have accomplished to i...

Full description

Saved in:
Bibliographic Details
Main Authors: Muhammad Shahid, Dildar, Nayeem, Khan, Johari, Abdullah, Adnan, Shahid Khan
Format: Article
Language:English
Published: IEEE 2017
Subjects:
Online Access:http://ir.unimas.my/id/eprint/16230/1/Effective%20Way%20to%20Defend%20the%20Hypervisor%20%28abstract%29.pdf
http://ir.unimas.my/id/eprint/16230/
http://ieeexplore.ieee.org/document/7905282/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.unimas.ir.16230
record_format eprints
spelling my.unimas.ir.162302022-09-29T03:35:51Z http://ir.unimas.my/id/eprint/16230/ Effective way to defend the hypervisor attacks in cloud computing Muhammad Shahid, Dildar Nayeem, Khan Johari, Abdullah Adnan, Shahid Khan T Technology (General) Nowadays, the organizations are emphasizing on the security and resilient aspect of the cloud computing to protect the privacy and confidentiality of their data information. However, the hypervisor attack remains a hot issue by the cloud user even though enormous research have accomplished to inhibit the vulnerabilities in the virtualized cloud environment.Therefore, we have proposed the Virtual Machines and Hypervisor Intrusion Detection System, VMHIDS as our technique in detecting and preventing the hypervisor attacks in the virtualized cloud environment. The VMHIDS has adopted several features from the other techniques by inspecting the tasks frequently which then prevent suspicious event occur. Through the VMHIDS, the hypervisor attack is mitigated. IEEE 2017 Article PeerReviewed text en http://ir.unimas.my/id/eprint/16230/1/Effective%20Way%20to%20Defend%20the%20Hypervisor%20%28abstract%29.pdf Muhammad Shahid, Dildar and Nayeem, Khan and Johari, Abdullah and Adnan, Shahid Khan (2017) Effective way to defend the hypervisor attacks in cloud computing. 2017 2nd International Conference on Anti-Cyber Crimes (ICACC). pp. 154-159. ISSN 978-1-5090-5814-3 http://ieeexplore.ieee.org/document/7905282/ DOI: 10.1109/Anti-Cybercrime.2017.7905282
institution Universiti Malaysia Sarawak
building Centre for Academic Information Services (CAIS)
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Sarawak
content_source UNIMAS Institutional Repository
url_provider http://ir.unimas.my/
language English
topic T Technology (General)
spellingShingle T Technology (General)
Muhammad Shahid, Dildar
Nayeem, Khan
Johari, Abdullah
Adnan, Shahid Khan
Effective way to defend the hypervisor attacks in cloud computing
description Nowadays, the organizations are emphasizing on the security and resilient aspect of the cloud computing to protect the privacy and confidentiality of their data information. However, the hypervisor attack remains a hot issue by the cloud user even though enormous research have accomplished to inhibit the vulnerabilities in the virtualized cloud environment.Therefore, we have proposed the Virtual Machines and Hypervisor Intrusion Detection System, VMHIDS as our technique in detecting and preventing the hypervisor attacks in the virtualized cloud environment. The VMHIDS has adopted several features from the other techniques by inspecting the tasks frequently which then prevent suspicious event occur. Through the VMHIDS, the hypervisor attack is mitigated.
format Article
author Muhammad Shahid, Dildar
Nayeem, Khan
Johari, Abdullah
Adnan, Shahid Khan
author_facet Muhammad Shahid, Dildar
Nayeem, Khan
Johari, Abdullah
Adnan, Shahid Khan
author_sort Muhammad Shahid, Dildar
title Effective way to defend the hypervisor attacks in cloud computing
title_short Effective way to defend the hypervisor attacks in cloud computing
title_full Effective way to defend the hypervisor attacks in cloud computing
title_fullStr Effective way to defend the hypervisor attacks in cloud computing
title_full_unstemmed Effective way to defend the hypervisor attacks in cloud computing
title_sort effective way to defend the hypervisor attacks in cloud computing
publisher IEEE
publishDate 2017
url http://ir.unimas.my/id/eprint/16230/1/Effective%20Way%20to%20Defend%20the%20Hypervisor%20%28abstract%29.pdf
http://ir.unimas.my/id/eprint/16230/
http://ieeexplore.ieee.org/document/7905282/
_version_ 1745566033323753472
score 13.214268