Abstract—In this paper, we introduce Collabra, a distributed intrusion detection platform based on Xen hypervisors to maintain the security of the cloud based on virtualized network. While the concept of virtual machine monitor (VMM) signifies implementing an abstraction layer between the underlying host and the guest operating system (OS) to enforce security, its kernel is required to be free of vulnerabilities that intruders can use to compromise the host. In Xen, guest applications make resource requests through the hyper-call API to transfer the privilege to the VMM kernel for executing privileged operations. On a cloud scale, there exist hundreds of VM networks and thousands of guest operating systems (OSes) running on virtual domains....
Cloud computing is a technology of inter-connected servers and resources that use virtualization to ...
As organizations drastically expand their usage of collaborative systems and multi-user applications...
Cloud providers attempt to maintain the highest levels of isolation between Virtual Machines (VMs) a...
In this paper, a virtual distributed monitoring environment called HyperSpector is described that ac...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have p...
Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have p...
In recent years, Cloud computing has emerged as a new paradigm for delivering highly scalable and on...
Virtualization is critical to the infrastructure of cloud computing environment and other online ser...
The work focuses on virtual-machine based cloud data centers and the possible attacks coming the ext...
Abstract — Cloud computing is the next generation of networking computing, since it can deliver both...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has becom...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Cloud computing is a technology of inter-connected servers and resources that use virtualization to ...
As organizations drastically expand their usage of collaborative systems and multi-user applications...
Cloud providers attempt to maintain the highest levels of isolation between Virtual Machines (VMs) a...
In this paper, a virtual distributed monitoring environment called HyperSpector is described that ac...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has beco...
Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have p...
Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have p...
In recent years, Cloud computing has emerged as a new paradigm for delivering highly scalable and on...
Virtualization is critical to the infrastructure of cloud computing environment and other online ser...
The work focuses on virtual-machine based cloud data centers and the possible attacks coming the ext...
Abstract — Cloud computing is the next generation of networking computing, since it can deliver both...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has becom...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
Cloud computing is a technology of inter-connected servers and resources that use virtualization to ...
As organizations drastically expand their usage of collaborative systems and multi-user applications...
Cloud providers attempt to maintain the highest levels of isolation between Virtual Machines (VMs) a...