Client to client attacks protection in cloud computing by a secure virtualization model

Cloud computing was the long held dream of computing which has the potential to transform a large part of the IT industry, shaping the way that IT hardware designed and purchased and making software even more attractive as a service. Without Virtualization cloud computing cannot achieve to its incre...

Full description

Saved in:
Bibliographic Details
Main Author: Abadi, Ahad Akbar
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/48175/1/AhadAkhbarAbadiMFC2013.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.48175
record_format uketd_dc
spelling my-utm-ep.481752017-08-22T03:45:29Z Client to client attacks protection in cloud computing by a secure virtualization model 2013 Abadi, Ahad Akbar QA76 Computer software Cloud computing was the long held dream of computing which has the potential to transform a large part of the IT industry, shaping the way that IT hardware designed and purchased and making software even more attractive as a service. Without Virtualization cloud computing cannot achieve to its incredible goals. VMware, Xen and KVM are some hypervisor software which provides server Virtualization ability for cloud computing structure. Although cloud computing brings gigantic advantages, the security issues still the considerable difficulties for customers. This means the attacks which can threat the computer networks also can be threats for cloud computing environment.VM to VM attack is one of the common types of attacks that classified into two different groups such as VM hopping and VM mobility. Port scanning comes in the first step of a computer attack. The aim of port scanning is to find the open ports that can be exploited by attackers, in addition, in attacker view getting information about the other port's status can be useful for further exploitation. The goal of this project is to propose a new model for achieving the better method to realize port scanning attempts and find out the information about suspicious port scanner virtual machine in cloud computing. 2013 Thesis http://eprints.utm.my/id/eprint/48175/ http://eprints.utm.my/id/eprint/48175/1/AhadAkhbarAbadiMFC2013.pdf application/pdf en public http://libraryopac.utm.my/client/en_AU/main/search/results/?lm=&qu=Client+to+client+attacks+protection+in+cloud+computing+by+a+secure+virtualization+model&rt=&submit= masters Universiti Teknologi Malaysia, Faculty of Computing Faculty of Computing
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Abadi, Ahad Akbar
Client to client attacks protection in cloud computing by a secure virtualization model
description Cloud computing was the long held dream of computing which has the potential to transform a large part of the IT industry, shaping the way that IT hardware designed and purchased and making software even more attractive as a service. Without Virtualization cloud computing cannot achieve to its incredible goals. VMware, Xen and KVM are some hypervisor software which provides server Virtualization ability for cloud computing structure. Although cloud computing brings gigantic advantages, the security issues still the considerable difficulties for customers. This means the attacks which can threat the computer networks also can be threats for cloud computing environment.VM to VM attack is one of the common types of attacks that classified into two different groups such as VM hopping and VM mobility. Port scanning comes in the first step of a computer attack. The aim of port scanning is to find the open ports that can be exploited by attackers, in addition, in attacker view getting information about the other port's status can be useful for further exploitation. The goal of this project is to propose a new model for achieving the better method to realize port scanning attempts and find out the information about suspicious port scanner virtual machine in cloud computing.
format Thesis
qualification_level Master's degree
author Abadi, Ahad Akbar
author_facet Abadi, Ahad Akbar
author_sort Abadi, Ahad Akbar
title Client to client attacks protection in cloud computing by a secure virtualization model
title_short Client to client attacks protection in cloud computing by a secure virtualization model
title_full Client to client attacks protection in cloud computing by a secure virtualization model
title_fullStr Client to client attacks protection in cloud computing by a secure virtualization model
title_full_unstemmed Client to client attacks protection in cloud computing by a secure virtualization model
title_sort client to client attacks protection in cloud computing by a secure virtualization model
granting_institution Universiti Teknologi Malaysia, Faculty of Computing
granting_department Faculty of Computing
publishDate 2013
url http://eprints.utm.my/id/eprint/48175/1/AhadAkhbarAbadiMFC2013.pdf
_version_ 1747817326033502208