Client to client attacks protection in cloud computing by a secure virtualization model

Cloud computing was the long held dream of computing which has the potential to transform a large part of the IT industry, shaping the way that IT hardware designed and purchased and making software even more attractive as a service. Without Virtualization cloud computing cannot achieve to its incre...

Full description

Saved in:
Bibliographic Details
Main Author: Abadi, Ahad Akbar
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/48175/1/AhadAkhbarAbadiMFC2013.pdf
http://eprints.utm.my/id/eprint/48175/
http://libraryopac.utm.my/client/en_AU/main/search/results/?lm=&qu=Client+to+client+attacks+protection+in+cloud+computing+by+a+secure+virtualization+model&rt=&submit=
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Cloud computing was the long held dream of computing which has the potential to transform a large part of the IT industry, shaping the way that IT hardware designed and purchased and making software even more attractive as a service. Without Virtualization cloud computing cannot achieve to its incredible goals. VMware, Xen and KVM are some hypervisor software which provides server Virtualization ability for cloud computing structure. Although cloud computing brings gigantic advantages, the security issues still the considerable difficulties for customers. This means the attacks which can threat the computer networks also can be threats for cloud computing environment.VM to VM attack is one of the common types of attacks that classified into two different groups such as VM hopping and VM mobility. Port scanning comes in the first step of a computer attack. The aim of port scanning is to find the open ports that can be exploited by attackers, in addition, in attacker view getting information about the other port's status can be useful for further exploitation. The goal of this project is to propose a new model for achieving the better method to realize port scanning attempts and find out the information about suspicious port scanner virtual machine in cloud computing.