Results 1 to 10 of about 17,760 (141)
CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection
IoT generates considerable amounts of data, which often requires leveraging cloud computing to effectively scale the costs of transferring and computing these data. The concern regarding cloud security is more severe because many devices are connected to the cloud.
Weizhong Qiang +4 more
doaj +4 more sources
Virtual machine introspection: towards bridging the semantic gap [PDF]
Virtual machine introspection is a technique used to inspect and analyse the code running on a given virtual machine. Virtual machine introspection has gained considerable attention in the field of computer security research. In recent years, it has been applied in various areas, ranging from intrusion detection and malware analysis to complete cloud ...
Asit More, Shashikala Tapaswi
core +3 more sources
Narrowing the semantic gap in virtual machine introspection
Virtual machine introspection(VMI)has been widely used in areas such as intrusion detection and malware analysis.However,due to the existence of semantic gap,the generality and the efficiency of VMI were partly influenced while getting internal information of a virtual machine.By analyzing the deficiencies of existing technology of semantic gap ...
Chao-yuan CUI +3 more
doaj +4 more sources
Virtual Machine Introspection [PDF]
Cyberattacks targeted at virtualization infrastructure\ud underlying cloud computing services has become increasingly\ud sophisticated. This paper presents a novel malware and rookit detection\ud system which protects the guests against different attacks.\ud It combines system call monitoring and system call hashing on the\ud guest kernel together with
Win, Thu Yein +4 more
openaire +2 more sources
A Security Detection Framework Based on Virtual Machine Introspection [PDF]
In order to detect and stop malicious stream that is disguised as legitimate application stream,a security framework based on virtual machine introspection technique is proposed.It uses hardware events combined with virtual machine introspection and ...
LIU Zheyuan,XU Jun,WANG Xing,GAO Hui
doaj +1 more source
Design of Monitoring Framework for Malicious Hidden Process on CloudStack [PDF]
Most cloud platforms like CloudStack have no safety plug-in or function to protect the virtual machines.Aiming at this problem,this paper proposes a monitoring framework for malicious hidden process based on Xen virtual machine monitor on CloudStack ...
CUI Jingsong,TIAN Changyou,GUO Chi,YIN Xue
doaj +1 more source
Using ABI for virtual machines introspection [PDF]
The paper proposes an approach to introspection of virtual machines using the applications binary interface. The purpose of the method is to get information about the system, while having a minimum knowledge about its internal structure. Our system is based on QEMU emulator and has a modular structure.
N. I. Fursova +2 more
openaire +2 more sources
Intrusion detection system in cloud environment: Literature survey & future research directions
The cloud provides infrastructure, applications, and storage services to users that need to be protected by some policies or procedures. Hence, security in the cloud is to protect user data and infrastructure from malicious users by providing ...
Suman Lata, Dheerendra Singh
doaj +1 more source
VMI-based virtual machine remote attestation scheme
The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo ...
Wei WANG +3 more
doaj +3 more sources
Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection
The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual ...
Huseyn Huseynov +2 more
doaj +1 more source

