A virtual domain enables grouping of related virtual machines running on separate physical machine into a single network domain with a unified security policy. Since the virtual machines can be running different operating systems and applications, the attacker can exploit even a single vulnerability in any of the operating system or applications in a single virtual machine to attack other machines in the virtual domain. There is a need to develop intrusion detection techniques to deal with different types of attacks in virtual domains. In this paper we consider the design choices for attack detection and propose intrusion detection architecture to deal with attacks in virtual domains. Our architecture takes into account the specific feature...
This research paper is to analyze to identify the possible attacks, collecting information related t...
International audienceNowadays, network technologies are essential for transferring and storing vari...
This paper describes an investigation into how an employee using a virtual environment can circumven...
A trusted virtual domain (TVD) enables grouping of related virtual machines running on separate phys...
We propose security architecture based on virtual machine monitor to efficiently deal with attacks o...
Today, cloud computing is one of the increasingly popular technology where the customer can use the ...
In a virtual networked system where infrastructure is shared by more than one user security is a ser...
With the development of computer science, the detection of virtual machines and the masking of the v...
Virtualisation is one of the important technologies for the realisation of cloud computing. A Virtua...
In this paper, a virtual distributed monitoring environment called HyperSpector is described that ac...
Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have p...
Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have p...
Security is an interesting and significance issue for popular virtual platforms, such as virtualizat...
Cloud computing platforms are usually based on virtual machines as the underlying architecture; the ...
This article presents an overview of some of the major works that focus on the use of virtualization...
This research paper is to analyze to identify the possible attacks, collecting information related t...
International audienceNowadays, network technologies are essential for transferring and storing vari...
This paper describes an investigation into how an employee using a virtual environment can circumven...
A trusted virtual domain (TVD) enables grouping of related virtual machines running on separate phys...
We propose security architecture based on virtual machine monitor to efficiently deal with attacks o...
Today, cloud computing is one of the increasingly popular technology where the customer can use the ...
In a virtual networked system where infrastructure is shared by more than one user security is a ser...
With the development of computer science, the detection of virtual machines and the masking of the v...
Virtualisation is one of the important technologies for the realisation of cloud computing. A Virtua...
In this paper, a virtual distributed monitoring environment called HyperSpector is described that ac...
Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have p...
Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have p...
Security is an interesting and significance issue for popular virtual platforms, such as virtualizat...
Cloud computing platforms are usually based on virtual machines as the underlying architecture; the ...
This article presents an overview of some of the major works that focus on the use of virtualization...
This research paper is to analyze to identify the possible attacks, collecting information related t...
International audienceNowadays, network technologies are essential for transferring and storing vari...
This paper describes an investigation into how an employee using a virtual environment can circumven...