Results 1 to 10 of about 17,760 (141)

CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection

open access: yesIEEE Access, 2017
IoT generates considerable amounts of data, which often requires leveraging cloud computing to effectively scale the costs of transferring and computing these data. The concern regarding cloud security is more severe because many devices are connected to the cloud.
Weizhong Qiang   +4 more
doaj   +4 more sources

Virtual machine introspection: towards bridging the semantic gap [PDF]

open access: yesJournal of Cloud Computing, 2014
Virtual machine introspection is a technique used to inspect and analyse the code running on a given virtual machine. Virtual machine introspection has gained considerable attention in the field of computer security research. In recent years, it has been applied in various areas, ranging from intrusion detection and malware analysis to complete cloud ...
Asit More, Shashikala Tapaswi
core   +3 more sources

Narrowing the semantic gap in virtual machine introspection

open access: yesTongxin xuebao, 2015
Virtual machine introspection(VMI)has been widely used in areas such as intrusion detection and malware analysis.However,due to the existence of semantic gap,the generality and the efficiency of VMI were partly influenced while getting internal information of a virtual machine.By analyzing the deficiencies of existing technology of semantic gap ...
Chao-yuan CUI   +3 more
doaj   +4 more sources

Virtual Machine Introspection [PDF]

open access: yesProceedings of the 7th International Conference on Security of Information and Networks, 2014
Cyberattacks targeted at virtualization infrastructure\ud underlying cloud computing services has become increasingly\ud sophisticated. This paper presents a novel malware and rookit detection\ud system which protects the guests against different attacks.\ud It combines system call monitoring and system call hashing on the\ud guest kernel together with
Win, Thu Yein   +4 more
openaire   +2 more sources

A Security Detection Framework Based on Virtual Machine Introspection [PDF]

open access: yesJisuanji gongcheng, 2016
In order to detect and stop malicious stream that is disguised as legitimate application stream,a security framework based on virtual machine introspection technique is proposed.It uses hardware events combined with virtual machine introspection and ...
LIU Zheyuan,XU Jun,WANG Xing,GAO Hui
doaj   +1 more source

Design of Monitoring Framework for Malicious Hidden Process on CloudStack [PDF]

open access: yesJisuanji gongcheng, 2016
Most cloud platforms like CloudStack have no safety plug-in or function to protect the virtual machines.Aiming at this problem,this paper proposes a monitoring framework for malicious hidden process based on Xen virtual machine monitor on CloudStack ...
CUI Jingsong,TIAN Changyou,GUO Chi,YIN Xue
doaj   +1 more source

Using ABI for virtual machines introspection [PDF]

open access: yesProceedings of the Institute for System Programming of the RAS, 2015
The paper proposes an approach to introspection of virtual machines using the applications binary interface. The purpose of the method is to get information about the system, while having a minimum knowledge about its internal structure. Our system is based on QEMU emulator and has a modular structure.
N. I. Fursova   +2 more
openaire   +2 more sources

Intrusion detection system in cloud environment: Literature survey & future research directions

open access: yesInternational Journal of Information Management Data Insights, 2022
The cloud provides infrastructure, applications, and storage services to users that need to be protected by some policies or procedures. Hence, security in the cloud is to protect user data and infrastructure from malicious users by providing ...
Suman Lata, Dheerendra Singh
doaj   +1 more source

VMI-based virtual machine remote attestation scheme

open access: yes网络与信息安全学报, 2018
The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo ...
Wei WANG   +3 more
doaj   +3 more sources

Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection

open access: yesBig Data and Cognitive Computing, 2021
The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual ...
Huseyn Huseynov   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy