Virtualization and Cloud, Security Threats and Defense Practices
Virtualization and Cloud, Security Threats and Defense Practices
- 2016
- 35
Abstract, Acknowledgements, Introduction, Virtualization, System Emulation, Hypervisor, Types of Virtualization, Cloud Service Definition and Models, What is Cloud Computing?, Characteristics of Cloud Computing, Cloud Computing Services, Models in Cloud Computing, Analysis of the Virtualization and Cloud Security Threats, DoS Attacks, Virtual Machine Escape, VM Spawl, Hypervisor Hyperjacking, Guest to Guest Attacks, Unsafe Virtual Machine Migrations, Rootkit Software Attacks, Physical Access and Hardware Attacks, Achieving Security in Virtualization and Cloud Services, Monitoring the Servers, Network Protection, Mitigating DDoS Attacks, Conclusion, Future Work, References.
Abstract, Acknowledgements, Introduction, Virtualization, System Emulation, Hypervisor, Types of Virtualization, Cloud Service Definition and Models, What is Cloud Computing?, Characteristics of Cloud Computing, Cloud Computing Services, Models in Cloud Computing, Analysis of the Virtualization and Cloud Security Threats, DoS Attacks, Virtual Machine Escape, VM Spawl, Hypervisor Hyperjacking, Guest to Guest Attacks, Unsafe Virtual Machine Migrations, Rootkit Software Attacks, Physical Access and Hardware Attacks, Achieving Security in Virtualization and Cloud Services, Monitoring the Servers, Network Protection, Mitigating DDoS Attacks, Conclusion, Future Work, References.