Research Output
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments
  Computational systems are gradually moving towards Cloud Computing Infrastructures, using the several advantages they have to offer and especially the economic advantages in the era of an economic crisis. In addition to this revolution, several security matters emerged and especially the confrontation of malicious insiders. This paper proposes a methodology for detecting the co-residency and network stressing attacks in the kernel layer of a Kvm-based cloud environment, using an implementation of the Smith-Waterman genetic algorithm. The proposed approach has been explored in a test bed environment, producing results that verify its effectiveness.

  • Type:

    Article

  • Date:

    05 December 2014

  • Publication Status:

    Published

  • Publisher

    Springer Nature

  • DOI:

    10.1186/s13677-014-0020-6

  • Cross Ref:

    20

  • ISSN:

    2192-113X

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

  • Funders:

    Historic Funder (pre-Worktribe)

Citation

Pitropakis, N., Anastasopoulou, D., Pikrakis, A., & Lambrinoudakis, C. (2014). If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments. Journal of cloud computing advances, systems and applications, 3(1), https://doi.org/10.1186/s13677-014-0020-6

Authors

Keywords

Cloud computing, Security, Co-residency, Network stressing, Malicious insider, KVM, System calls, Smith-waterman

Monthly Views:

Available Documents
  • pdf

    If you want to know about a hunter, study his prey...

    783KB

    © Pitropakis et al.; licensee Springer. 2014
    This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.

  • Downloadable citations

    HTML BIB RTF