Client to client attacks protection in cloud computing by a secure virtualization model
Cloud computing was the long held dream of computing which has the potential to transform a large part of the IT industry, shaping the way that IT hardware designed and purchased and making software even more attractive as a service. Without Virtualization cloud computing cannot achieve to its incre...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/48175/1/AhadAkhbarAbadiMFC2013.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Cloud computing was the long held dream of computing which has the potential to transform a large part of the IT industry, shaping the way that IT hardware designed and purchased and making software even more attractive as a service. Without Virtualization cloud computing cannot achieve to its incredible goals. VMware, Xen and KVM are some hypervisor software which provides server Virtualization ability for cloud computing structure. Although cloud computing brings gigantic advantages, the security issues still the considerable difficulties for customers. This means the attacks which can threat the computer networks also can be threats for cloud computing environment.VM to VM attack is one of the common types of attacks that classified into two different groups such as VM hopping and VM mobility. Port scanning comes in the first step of a computer attack. The aim of port scanning is to find the open ports that can be exploited by attackers, in addition, in attacker view getting information about the other port's status can be useful for further exploitation. The goal of this project is to propose a new model for achieving the better method to realize port scanning attempts and find out the information about suspicious port scanner virtual machine in cloud computing. |
---|