Browsing by Author "Kanika"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Item Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing(IASIR, 2014) Kanika; Sidhu, NavjotCloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means of cloud computing is obtained by the virtualization of the resources such as hardware, platform, operating system and storages devices. Virtualization permits multiple operating systems to run on the same physical machine. Multiple tenants are unaware of the presence of the other tenant with whom they are sharing the resources. The co-existence of multiple virtual machines can be exploited to gain the access over other tenant's data or attack to deny of services. The significant concern is insuring the security and providing isolation between multiple operating systems. The paper explores various kinds of vulnerabilities and attacks associated with the virtualization.Item Impact of Denial of Service Attack on the Virtualization in Cloud Computing(2014) Kanika; Sidhu, NavjotCloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the Internet. Cloud computing offers infrastructure as a service (IaaS). IaaS provides infrastructure including software, hardware, storage space, network bandwidth to the users on demand over the internet. Cloud computing makes use of virtualization to provide infrastructure as a service. Virtualization is based on the concept that multiple tenants can use the same physical machine with multiple operating systems. Virtualization comprises the vulnerability of Denial of Service (DOS) attack that can affect the performance of cloud computing. A malicious VM attacker can compromise the other guest VM or the host OS. The paper explores the TCP SYN flood attack over the other guest VM by a malicious VM attacker coexisting in the virtualized cloud infrastructure. Different Parameters are analyzed over the victim VM to detect the TCP SYN flood attackItem Plasmodium's journey through the Anopheles mosquito: A comprehensive review(Elsevier B.V., 2020-12-17T00:00:00) Singh, Meghna; Suryanshu; Kanika; Singh, Gurmeet; Dubey, Alok; Chaitanya, R.K.The malaria parasite has an extraordinary ability to evade the immune system due to which the development of a malaria vaccine is a challenging task. Extensive research on malarial infection in the human host particularly during the liver stage has resulted in the discovery of potential candidate vaccines including RTS,S/AS01 and R21. However, complete elimination of malaria would require a holistic multi-component approach. In line with this, under the World Health Organization's PATH Malaria Vaccine Initiative (MVI), the research focus has shifted towards the sexual stages of malaria in the mosquito host. Last two decades of scientific research obtained seminal information regarding the sexual/mosquito stages of the malaria. This updated and comprehensive review would provide the basis for consolidated understanding of cellular, biochemical, molecular and immunological aspects of parasite transmission right from the sexual stage commitment in the human host to the sporozoite delivery back into subsequent vertebrate host by the female Anopheles mosquito. � 2020 Elsevier B.V. and Soci�t� Fran�aise de Biochimie et Biologie Mol�culaire (SFBBM)Item Securing virtualization to mitigate TCP-DDOS between multiple tenants on the same physical host in cloud computing(Central University of Punjab, 2014) Kanika; Sidhu, NavjootCloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the Internet. The means of cloud computing is obtained by the virtualization of the resources such as hardware, platform, operating system and storage devices. Virtualization permits multiple operating systems to run on the same physical machine. Multiple tenants are unaware of the presence of the other tenant with whom they are sharing the resources. The co-existence of multiple virtual machines can be exploited to gain the access over other tenant's data or attack to deny of services. The significant concern is insuring the security and providing isolation between multiple operating systems. Denial-of-Service (DoS) attack poses a serious network security challenge to the virtualized cloud computing. All the virtual machines and the host machine shares common resources over the cloud computing. A malicious virtual machine can exhaust the common resources by flooding the co- existing VM with high rate of unreasonable network traffic. The threat of DoS attack becomes even more severe with DDoS (Distributed Denial-of-Service) attack. Other virtual machines are compromised on the virtualized cloud to perform DDoS attack. The dissertation aims to provide an analysis of the different attacks raised by the multi-tenancy and the virtualization in an IaaS cloud. The research focuses on the threats arises from malicious tenants to the co-existing tenants on the same physical host. As part of the aim of this research, the terms of cloud computing, multi-tenancy and virtualization are analysed. The vulnerability of the DDoS attack by a malicious virtual machine over co-existing virtual machine in the private cloud infrastructure is explored along with a mechanism on how to approach it. The research approaches to provide a security model to mitigate the effect of denial of service attack from the virtualized cloud computing.