Effective way to defend the hypervisor attacks in cloud computing
Nowadays, the organizations are emphasizing on the security and resilient aspect of the cloud computing to protect the privacy and confidentiality of their data information. However, the hypervisor attack remains a hot issue by the cloud user even though enormous research have accomplished to i...
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2017
|
| Subjects: | |
| Online Access: | http://ir.unimas.my/id/eprint/16230/ http://ir.unimas.my/id/eprint/16230/1/Effective%20Way%20to%20Defend%20the%20Hypervisor%20%28abstract%29.pdf |
| _version_ | 1848838013386227712 |
|---|---|
| author | Muhammad Shahid, Dildar Nayeem, Khan Johari, Abdullah Adnan, Shahid Khan |
| author_facet | Muhammad Shahid, Dildar Nayeem, Khan Johari, Abdullah Adnan, Shahid Khan |
| author_sort | Muhammad Shahid, Dildar |
| building | UNIMAS Institutional Repository |
| collection | Online Access |
| description | Nowadays, the organizations are emphasizing
on the security and resilient aspect of the cloud
computing to protect the privacy and confidentiality of
their data information. However, the hypervisor attack
remains a hot issue by the cloud user even though
enormous research have accomplished to inhibit the
vulnerabilities in the virtualized cloud
environment.Therefore, we have proposed the Virtual
Machines and Hypervisor Intrusion Detection System,
VMHIDS as our technique in detecting and preventing
the hypervisor attacks in the virtualized cloud
environment. The VMHIDS has adopted several features
from the other techniques by inspecting the tasks
frequently which then prevent suspicious event occur.
Through the VMHIDS, the hypervisor attack is
mitigated. |
| first_indexed | 2025-11-15T06:48:48Z |
| format | Article |
| id | unimas-16230 |
| institution | Universiti Malaysia Sarawak |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T06:48:48Z |
| publishDate | 2017 |
| publisher | IEEE |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | unimas-162302022-09-29T03:35:51Z http://ir.unimas.my/id/eprint/16230/ Effective way to defend the hypervisor attacks in cloud computing Muhammad Shahid, Dildar Nayeem, Khan Johari, Abdullah Adnan, Shahid Khan T Technology (General) Nowadays, the organizations are emphasizing on the security and resilient aspect of the cloud computing to protect the privacy and confidentiality of their data information. However, the hypervisor attack remains a hot issue by the cloud user even though enormous research have accomplished to inhibit the vulnerabilities in the virtualized cloud environment.Therefore, we have proposed the Virtual Machines and Hypervisor Intrusion Detection System, VMHIDS as our technique in detecting and preventing the hypervisor attacks in the virtualized cloud environment. The VMHIDS has adopted several features from the other techniques by inspecting the tasks frequently which then prevent suspicious event occur. Through the VMHIDS, the hypervisor attack is mitigated. IEEE 2017 Article PeerReviewed text en http://ir.unimas.my/id/eprint/16230/1/Effective%20Way%20to%20Defend%20the%20Hypervisor%20%28abstract%29.pdf Muhammad Shahid, Dildar and Nayeem, Khan and Johari, Abdullah and Adnan, Shahid Khan (2017) Effective way to defend the hypervisor attacks in cloud computing. 2017 2nd International Conference on Anti-Cyber Crimes (ICACC). pp. 154-159. ISSN 978-1-5090-5814-3 http://ieeexplore.ieee.org/document/7905282/ DOI: 10.1109/Anti-Cybercrime.2017.7905282 |
| spellingShingle | T Technology (General) Muhammad Shahid, Dildar Nayeem, Khan Johari, Abdullah Adnan, Shahid Khan Effective way to defend the hypervisor attacks in cloud computing |
| title | Effective way to defend the hypervisor attacks in cloud computing |
| title_full | Effective way to defend the hypervisor attacks in cloud computing |
| title_fullStr | Effective way to defend the hypervisor attacks in cloud computing |
| title_full_unstemmed | Effective way to defend the hypervisor attacks in cloud computing |
| title_short | Effective way to defend the hypervisor attacks in cloud computing |
| title_sort | effective way to defend the hypervisor attacks in cloud computing |
| topic | T Technology (General) |
| url | http://ir.unimas.my/id/eprint/16230/ http://ir.unimas.my/id/eprint/16230/ http://ir.unimas.my/id/eprint/16230/ http://ir.unimas.my/id/eprint/16230/1/Effective%20Way%20to%20Defend%20the%20Hypervisor%20%28abstract%29.pdf |