2012 IEEE Eighth World Congress on Services 2012
DOI: 10.1109/services.2012.45
|View full text |Cite
|
Sign up to set email alerts
|

IDS Based Defense for Cloud Based Mobile Infrastructure as a Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
2
2
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…Many other design and implementation vulnerabilities due to increased code size and use of unpatched old images are also vulnerable to zero-day attacks, VM escape attack, and VM checkpoint attack [47]. Furthermore, malicious hypervisors such as BLUEPILL rootkit [85], Vitriol [11] and SubVir are installed on the fly, which give attacker the host privileges to modify and control VMs [38]. These vulnerabilities may allow the insiders to bypass certain security boundaries, escalate privileges and remote code execution.…”
Section: Virtualizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Many other design and implementation vulnerabilities due to increased code size and use of unpatched old images are also vulnerable to zero-day attacks, VM escape attack, and VM checkpoint attack [47]. Furthermore, malicious hypervisors such as BLUEPILL rootkit [85], Vitriol [11] and SubVir are installed on the fly, which give attacker the host privileges to modify and control VMs [38]. These vulnerabilities may allow the insiders to bypass certain security boundaries, escalate privileges and remote code execution.…”
Section: Virtualizationmentioning
confidence: 99%
“…In addition to the above-mentioned issues, there are many other security and privacy challenges which have been familiarized after the emergence of new cloud concepts that mainly include cloud federation, insourcing and outsourcing of dynamic resources [38,47,62,97]. These advance-level security challenges can be categorized into five main classes, including safety standards, network, access control, cloud infrastructure and data categories.…”
Section: Other Security Issuesmentioning
confidence: 99%
“…Many intrusion detection and information security approaches for securing cloud have been proposed and are in practice [5,[6][7][8][9][10][11][12][13][14][15][16]. In a recent research paper by, Rocha and Correia [17] presents how malicious insiders can steal confidential data.…”
Section: Introductionmentioning
confidence: 99%
“…The VM's are compromised as zombies, moreover, the detection of these zombies is very difficult because the cloud users are allowed to install any number of applications on their VM's some of which may be malicious. Some of the attacks launched on the VM's are listed below [1]:…”
Section: Introductionmentioning
confidence: 99%