A survey on virtual machine migration and server consolidation frameworks for cloud data centers

RW Ahmad, A Gani, SHA Hamid, M Shiraz… - Journal of network and …, 2015 - Elsevier
Abstract Modern Cloud Data Centers exploit virtualization for efficient resource management
to reduce cloud computational cost and energy budget. Virtualization empowered by virtual …

Intrusion detection techniques in cloud environment: A survey

P Mishra, ES Pilli, V Varadharajan… - Journal of Network and …, 2017 - Elsevier
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …

[PDF][PDF] A virtual machine introspection based architecture for intrusion detection.

T Garfinkel, M Rosenblum - Ndss, 2003 - academia.edu
Today's architectures for intrusion detection force the IDS designer to make a difficult choice.
If the IDS resides on the host, it has an excellent view of what is happening in that host's …

ReVirt: Enabling intrusion analysis through virtual-machine logging and replay

GW Dunlap, ST King, S Cinar, MA Basrai… - ACM SIGOPS Operating …, 2002 - dl.acm.org
Current system loggers have two problems: they depend on the integrity of the operating
system being logged, and they do not save sufficient information to replay and analyze …

Terra: A virtual machine-based platform for trusted computing

T Garfinkel, B Pfaff, J Chow, M Rosenblum… - Proceedings of the …, 2003 - dl.acm.org
We present a flexible architecture for trusted computing, called Terra, that allows
applications with a wide range of security requirements to run simultaneously on commodity …

S2E: A platform for in-vivo multi-path analysis of software systems

V Chipounov, V Kuznetsov, G Candea - Acm Sigplan Notices, 2011 - dl.acm.org
This paper presents S2E, a platform for analyzing the properties and behavior of software
systems. We demonstrate S2E's use in develo** practical tools for comprehensive …

[BOOK][B] Cloud computing: theory and practice

DC Marinescu - 2022 - books.google.com
Cloud Computing: Theory and Practice, Third Edition provides students and IT professionals
with an in-depth analysis of the cloud from the ground up. After an introduction to network …

Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction

X Jiang, X Wang, D Xu - ACM Transactions on Information and System …, 2010 - dl.acm.org
An alarming trend in recent malware incidents is that they are armed with stealthy
techniques to detect, evade, and subvert malware detection facilities of the victim. On the …

Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization

F Zhang, J Chen, H Chen, B Zang - Proceedings of the twenty-third acm …, 2011 - dl.acm.org
Multi-tenant cloud, which usually leases resources in the form of virtual machines, has been
commercially available for years. Unfortunately, with the adoption of commodity virtualized …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …