Computer Science And Technology - Research Publications

Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    Item
    Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing
    (IASIR, 2014) Kanika; Sidhu, Navjot
    Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means of cloud computing is obtained by the virtualization of the resources such as hardware, platform, operating system and storages devices. Virtualization permits multiple operating systems to run on the same physical machine. Multiple tenants are unaware of the presence of the other tenant with whom they are sharing the resources. The co-existence of multiple virtual machines can be exploited to gain the access over other tenant's data or attack to deny of services. The significant concern is insuring the security and providing isolation between multiple operating systems. The paper explores various kinds of vulnerabilities and attacks associated with the virtualization.
  • Thumbnail Image
    Item
    Impact of Denial of Service Attack on the Virtualization in Cloud Computing
    (2014) Kanika; Sidhu, Navjot
    Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the Internet. Cloud computing offers infrastructure as a service (IaaS). IaaS provides infrastructure including software, hardware, storage space, network bandwidth to the users on demand over the internet. Cloud computing makes use of virtualization to provide infrastructure as a service. Virtualization is based on the concept that multiple tenants can use the same physical machine with multiple operating systems. Virtualization comprises the vulnerability of Denial of Service (DOS) attack that can affect the performance of cloud computing. A malicious VM attacker can compromise the other guest VM or the host OS. The paper explores the TCP SYN flood attack over the other guest VM by a malicious VM attacker coexisting in the virtualized cloud infrastructure. Different Parameters are analyzed over the victim VM to detect the TCP SYN flood attack