A survey on virtual machine migration and server consolidation frameworks for cloud data centers
Abstract Modern Cloud Data Centers exploit virtualization for efficient resource management
to reduce cloud computational cost and energy budget. Virtualization empowered by virtual …
to reduce cloud computational cost and energy budget. Virtualization empowered by virtual …
Intrusion detection techniques in cloud environment: A survey
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …
Researchers have provided a survey on several intrusion detection techniques for detecting …
[PDF][PDF] A virtual machine introspection based architecture for intrusion detection.
T Garfinkel, M Rosenblum - Ndss, 2003 - academia.edu
Today's architectures for intrusion detection force the IDS designer to make a difficult choice.
If the IDS resides on the host, it has an excellent view of what is happening in that host's …
If the IDS resides on the host, it has an excellent view of what is happening in that host's …
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
GW Dunlap, ST King, S Cinar, MA Basrai… - ACM SIGOPS Operating …, 2002 - dl.acm.org
Current system loggers have two problems: they depend on the integrity of the operating
system being logged, and they do not save sufficient information to replay and analyze …
system being logged, and they do not save sufficient information to replay and analyze …
Terra: A virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows
applications with a wide range of security requirements to run simultaneously on commodity …
applications with a wide range of security requirements to run simultaneously on commodity …
S2E: A platform for in-vivo multi-path analysis of software systems
This paper presents S2E, a platform for analyzing the properties and behavior of software
systems. We demonstrate S2E's use in develo** practical tools for comprehensive …
systems. We demonstrate S2E's use in develo** practical tools for comprehensive …
[BOOK][B] Cloud computing: theory and practice
DC Marinescu - 2022 - books.google.com
Cloud Computing: Theory and Practice, Third Edition provides students and IT professionals
with an in-depth analysis of the cloud from the ground up. After an introduction to network …
with an in-depth analysis of the cloud from the ground up. After an introduction to network …
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction
An alarming trend in recent malware incidents is that they are armed with stealthy
techniques to detect, evade, and subvert malware detection facilities of the victim. On the …
techniques to detect, evade, and subvert malware detection facilities of the victim. On the …
Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
Multi-tenant cloud, which usually leases resources in the form of virtual machines, has been
commercially available for years. Unfortunately, with the adoption of commodity virtualized …
commercially available for years. Unfortunately, with the adoption of commodity virtualized …
Methods, systems, and media for detecting covert malware
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …
some embodiments, a method for detecting covert malware in a computing environ ment is …