2016
DOI: 10.1007/978-981-287-990-5_9
|View full text |Cite
|
Sign up to set email alerts
|

A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing

Abstract: Cloud computing is a new model of computing which provides scalability, flexibility and on-demand service. Virtualization is one of the main components of the cloud, but unfortunately this technology suffers from many security vulnerabilities. The main purpose of this paper is to present a new secure architecture of Virtual Network machines in order to increase security among virtual machines in a virtualized environment (Xen as a case study). First, we expose the different network modes based on Xen Hyperviso… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 7 publications
0
3
0
1
Order By: Relevance
“…Para download de dados pelo usuário, os dados são criptografados de ponta a ponta com base em criptografia de chave pública, além de nós de computação multi-CPU (unidade de processamento central) e multiGPU (unidade de processamento gráfico) [17].…”
Section: Apresentar Técnicas De Proteção Dos Dados Armazenados Em Nuvemunclassified
“…Para download de dados pelo usuário, os dados são criptografados de ponta a ponta com base em criptografia de chave pública, além de nós de computação multi-CPU (unidade de processamento central) e multiGPU (unidade de processamento gráfico) [17].…”
Section: Apresentar Técnicas De Proteção Dos Dados Armazenados Em Nuvemunclassified
“…Ren et al [15] analyzed the security threats and challenges virtual machines faced and presented several typical attacks to virtual machine on the Xen platform. Elmrabet et al [16] proposed a new three-layer security architecture, which is composed of virtual switch, virtual firewall, and VLANs, to prevent attacks to virtual machines, such as sniffing, spoofing, and mac flooding. Sathya et al [17] introduced a trusted model for VM security in cloud computing.…”
Section: Related Workmentioning
confidence: 99%
“…Despite the wide variety of industrial cyber-attacks, they usually attempt to compromise these three security parameters: confidentiality, availability, and integrity [11]. The first class of attacks which target the confidentiality includes attacks such as Traffic analysis attack [17], Modbus network scanning [2], and DNP3 network scanning [7] which target the two industrial protocol Modbus and DNP3, respectively.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, we propose a network architecture to deploy the proposed anomalybased intrusion detection system across the Advanced Metering Infrastructure network. In addition, we propose a network security architecture composed of two types of Intrusion detection system types, Host and Network-based, deployed across the Advanced Metering Infrastructure network to inspect the traffic and detect the malicious one at all the levels.Despite the wide variety of industrial cyber-attacks, they usually attempt to compromise these three security parameters: confidentiality, availability, and integrity [11]. The first class of attacks which target the confidentiality includes attacks such as Traffic analysis attack [17], Modbus network scanning [2], and DNP3 network scanning [7] which target the two industrial protocol Modbus and DNP3, respectively.…”
mentioning
confidence: 99%