School Of Engineering And Technology
Permanent URI for this communityhttps://kr.cup.edu.in/handle/32116/78
Browse
4 results
Search Results
Item Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing(IASIR, 2014) Kanika; Sidhu, NavjotCloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means of cloud computing is obtained by the virtualization of the resources such as hardware, platform, operating system and storages devices. Virtualization permits multiple operating systems to run on the same physical machine. Multiple tenants are unaware of the presence of the other tenant with whom they are sharing the resources. The co-existence of multiple virtual machines can be exploited to gain the access over other tenant's data or attack to deny of services. The significant concern is insuring the security and providing isolation between multiple operating systems. The paper explores various kinds of vulnerabilities and attacks associated with the virtualization.Item Impact of Denial of Service Attack on the Virtualization in Cloud Computing(2014) Kanika; Sidhu, NavjotCloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the Internet. Cloud computing offers infrastructure as a service (IaaS). IaaS provides infrastructure including software, hardware, storage space, network bandwidth to the users on demand over the internet. Cloud computing makes use of virtualization to provide infrastructure as a service. Virtualization is based on the concept that multiple tenants can use the same physical machine with multiple operating systems. Virtualization comprises the vulnerability of Denial of Service (DOS) attack that can affect the performance of cloud computing. A malicious VM attacker can compromise the other guest VM or the host OS. The paper explores the TCP SYN flood attack over the other guest VM by a malicious VM attacker coexisting in the virtualized cloud infrastructure. Different Parameters are analyzed over the victim VM to detect the TCP SYN flood attackItem A fault tolerable load balancing technique in cloud computing(Central University of Punjab, 2014) Shiny; Khurana, Surinder.KAs the IT industry is growing day by day, the need of computing and data storage is increasing rapidly. The process of this increasing mass of data requires more computer equipment to meet the various needs of the organizations. To better capitalize their investment, the over-equipped organizations open their infrastructures to others by exploiting the Internet and other important technologies such as virtualization by creating a new computing model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the history of computers. However, there are number of technical challenges that need to be tackled which include reliability, resource provisioning, fault tolerance, load balancing and efficient mechanism to increase the service level agreement (SLA) and better use of the resources. The main purpose of this dissertation report is to provide a preface of the topic and to work on the various issues involved in the field of load balancing and fault tolerance i.e. load computation and the distribution of load. Load balancing and fault tolerance in cloud computing have a great impact on the performance of the system. Good load balancing makes cloud computing more efficient by provisioning of resources to cloud users on demand basis in pay-as-you-say manner. Load balancers are used for assigning load to different virtual machines in such a way that none of the nodes gets loaded heavily or lightly. When many clients request the server simultaneously, server is overloaded which causes fault. There are many load balancing algorithms and fault tolerance techniques in order to settle down these issues, but these techniques further had some drawbacks. Das and Khilar (2013) discussed a load balancing technique for virtualization and fault tolerance in cloud computing (LBVFT) to assign the task to the virtual nodes depending upon the success rates (SR) and the previous load history. This v technique tolerates not only the faults but also reduce the chance of future faults by not assigning tasks to virtual nodes of physical servers whose success rates are very low and loads are very high. But there is still a need to provide an efficient load balancing, load migration, load calculation and fault handling technique to make the VFT model more effective.Item Securing virtualization to mitigate TCP-DDOS between multiple tenants on the same physical host in cloud computing(Central University of Punjab, 2014) Kanika; Sidhu, NavjootCloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the Internet. The means of cloud computing is obtained by the virtualization of the resources such as hardware, platform, operating system and storage devices. Virtualization permits multiple operating systems to run on the same physical machine. Multiple tenants are unaware of the presence of the other tenant with whom they are sharing the resources. The co-existence of multiple virtual machines can be exploited to gain the access over other tenant's data or attack to deny of services. The significant concern is insuring the security and providing isolation between multiple operating systems. Denial-of-Service (DoS) attack poses a serious network security challenge to the virtualized cloud computing. All the virtual machines and the host machine shares common resources over the cloud computing. A malicious virtual machine can exhaust the common resources by flooding the co- existing VM with high rate of unreasonable network traffic. The threat of DoS attack becomes even more severe with DDoS (Distributed Denial-of-Service) attack. Other virtual machines are compromised on the virtualized cloud to perform DDoS attack. The dissertation aims to provide an analysis of the different attacks raised by the multi-tenancy and the virtualization in an IaaS cloud. The research focuses on the threats arises from malicious tenants to the co-existing tenants on the same physical host. As part of the aim of this research, the terms of cloud computing, multi-tenancy and virtualization are analysed. The vulnerability of the DDoS attack by a malicious virtual machine over co-existing virtual machine in the private cloud infrastructure is explored along with a mechanism on how to approach it. The research approaches to provide a security model to mitigate the effect of denial of service attack from the virtualized cloud computing.