Effective way to defend the hypervisor attacks in cloud computing

Nowadays, the organizations are emphasizing on the security and resilient aspect of the cloud computing to protect the privacy and confidentiality of their data information. However, the hypervisor attack remains a hot issue by the cloud user even though enormous research have accomplished to i...

Full description

Bibliographic Details
Main Authors: Muhammad Shahid, Dildar, Nayeem, Khan, Johari, Abdullah, Adnan, Shahid Khan
Format: Article
Language:English
Published: IEEE 2017
Subjects:
Online Access:http://ir.unimas.my/id/eprint/16230/
http://ir.unimas.my/id/eprint/16230/1/Effective%20Way%20to%20Defend%20the%20Hypervisor%20%28abstract%29.pdf
Description
Summary:Nowadays, the organizations are emphasizing on the security and resilient aspect of the cloud computing to protect the privacy and confidentiality of their data information. However, the hypervisor attack remains a hot issue by the cloud user even though enormous research have accomplished to inhibit the vulnerabilities in the virtualized cloud environment.Therefore, we have proposed the Virtual Machines and Hypervisor Intrusion Detection System, VMHIDS as our technique in detecting and preventing the hypervisor attacks in the virtualized cloud environment. The VMHIDS has adopted several features from the other techniques by inspecting the tasks frequently which then prevent suspicious event occur. Through the VMHIDS, the hypervisor attack is mitigated.