IMPROVING VIRTUAL MACHINE SECURITY THROUGH INTELLIGENT INTRUSION DETECTION SYSTEM
Journal Title: Indian Journal of Computer Science and Engineering - Year 2015, Vol 6, Issue 2
Abstract
Virtualization is the key feature of cloud computing which facilitates sharing of common resources among cloud users. As cloud computing is a shared facility and accessed remotely, it is vulnerable to various attacks. The shared resources may be exploited by the attackers through vulnerabilities. Virtualization technology is implemented by instantiating a virtual machine to each cloud user based on their requirements. Many virtual machines are instantiated on a single physical infrastructure. Although this virtualization technology is more beneficent for the users by means of low cost and for service providers by means of better utilization, it has several risks, in which security is the major one. Benefits of virtualization go beyond the cost savings. By better planning and management virtualization risk can be mitigated. The proposed work secures virtual machines by creating VM profiles, packet monitoring and by conducting periodic centralized vulnerability scans. It is consistent because both signature based and anomaly based IDS are combined. It is efficient because only the VMs affected by infected packets are scanned for vulnerability.
Authors and Affiliations
Ambikavathi C , Dr. S. K. Srivatsa
PROPERTIES AND APPROACH OF CRYPTOGRAPHIC HASH ALGORITHMS
The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. An overview is given...
MINING OF ECG SIGNAL FOR NEW DIAGNOSTIC INFORMATION
This paper investigates a technique, which extracts new features having potentiality for giving more discriminatory clues from simple ECG (Electrocardiogram) signals. The extracted feature parameters, Average RR Signal M...
A literature study on clustering the uncertainty data
Clustering is one of the important topics in data mining. The purpose of clustering is to group the similar data items. Clustering the uncertainty data is not an easy task but an essential task in data mining. Uncertain...
LEAKAGE POWER OPTIMIZED SEQUENTIAL CIRCUITS FOR USE IN NANOSCALE VLSI SYSTEMS
As the density and operating speed of CMOS VLSI chips increases, leakage power dissipation becomes more and more significant. Therefore it is necessary to reduce the leakage power of portable battery operated devices. Th...
Novel Low Power Comparator Design using Reversible Logic Gates
Reversible logic has received great attention in the recent years due to its ability to reduce the power dissipation which is the main requirement in low power digital design. It has wide applications in advanced computi...