Enviar búsqueda
Cargar
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
•
0 recomendaciones
•
30 vistas
IRJET Journal
Seguir
https://www.irjet.net/archives/V6/i3/IRJET-V6I3670.pdf
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 6
Descargar ahora
Descargar para leer sin conexión
Recomendados
Virtual desktop infrastructure
Virtual desktop infrastructure
gaurav jain
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor
Virtual desktop infrastructure
Virtual desktop infrastructure
Kavaskar Ganesan
Vmware View VDI 2012
Vmware View VDI 2012
blatrobe
Dz25764770
Dz25764770
IJERA Editor
Citrix meanings
Citrix meanings
pfunk1
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI Gateway
ObserveIT
Virtualization and Cloud Computing
Virtualization and Cloud Computing
Josh Folgado
Recomendados
Virtual desktop infrastructure
Virtual desktop infrastructure
gaurav jain
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor
Virtual desktop infrastructure
Virtual desktop infrastructure
Kavaskar Ganesan
Vmware View VDI 2012
Vmware View VDI 2012
blatrobe
Dz25764770
Dz25764770
IJERA Editor
Citrix meanings
Citrix meanings
pfunk1
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI Gateway
ObserveIT
Virtualization and Cloud Computing
Virtualization and Cloud Computing
Josh Folgado
vDesk: Introduction to Desktop Virtualization
vDesk: Introduction to Desktop Virtualization
RingCube Technologies, Inc.
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
247 Invest
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
Aruj Thirawat
12 Things You Must Know About VDI
12 Things You Must Know About VDI
Shivani Sehta
VDI/ VMware Horizon View
VDI/ VMware Horizon View
SumeraHangi
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
VMworld
Vdi strategy
Vdi strategy
latheefca
Mid term report
Mid term report
lokesh039
Introduction to Virtual Desktop Architectures
Introduction to Virtual Desktop Architectures
RingCube Technologies, Inc.
The Virtual Desktop Revolution
The Virtual Desktop Revolution
Yankee Group
Virtualization
Virtualization
satchipatra
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
Fabrizio Volpe
Vdi how-it-works618
Vdi how-it-works618
shiva2shetty
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
247 Invest
The Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra Molleti
Hitendra Molleti
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
FindWhitePapers
Virtualization for Cloud Environment
Virtualization for Cloud Environment
Dr. Sunil Kr. Pandey
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
eblake
Vdi
Vdi
Vdippt
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Journals
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Publishing House
Virtualization - cloud computing
Virtualization - cloud computing
Sweta Kumari Barnwal
Más contenido relacionado
La actualidad más candente
vDesk: Introduction to Desktop Virtualization
vDesk: Introduction to Desktop Virtualization
RingCube Technologies, Inc.
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
247 Invest
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
Aruj Thirawat
12 Things You Must Know About VDI
12 Things You Must Know About VDI
Shivani Sehta
VDI/ VMware Horizon View
VDI/ VMware Horizon View
SumeraHangi
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
VMworld
Vdi strategy
Vdi strategy
latheefca
Mid term report
Mid term report
lokesh039
Introduction to Virtual Desktop Architectures
Introduction to Virtual Desktop Architectures
RingCube Technologies, Inc.
The Virtual Desktop Revolution
The Virtual Desktop Revolution
Yankee Group
Virtualization
Virtualization
satchipatra
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
Fabrizio Volpe
Vdi how-it-works618
Vdi how-it-works618
shiva2shetty
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
247 Invest
The Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra Molleti
Hitendra Molleti
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
FindWhitePapers
Virtualization for Cloud Environment
Virtualization for Cloud Environment
Dr. Sunil Kr. Pandey
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
eblake
Vdi
Vdi
Vdippt
La actualidad más candente
(19)
vDesk: Introduction to Desktop Virtualization
vDesk: Introduction to Desktop Virtualization
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
White Paper: Smart Style Office as Virtual Deskopt Infrastructure for Desktop...
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
12 Things You Must Know About VDI
12 Things You Must Know About VDI
VDI/ VMware Horizon View
VDI/ VMware Horizon View
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
Vdi strategy
Vdi strategy
Mid term report
Mid term report
Introduction to Virtual Desktop Architectures
Introduction to Virtual Desktop Architectures
The Virtual Desktop Revolution
The Virtual Desktop Revolution
Virtualization
Virtualization
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
Vdi how-it-works618
Vdi how-it-works618
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
The Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra Molleti
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
Virtualization for Cloud Environment
Virtualization for Cloud Environment
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
Vdi
Vdi
Similar a IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Journals
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Publishing House
Virtualization - cloud computing
Virtualization - cloud computing
Sweta Kumari Barnwal
Logicalis - Virtualisation overview
Logicalis - Virtualisation overview
Logicalis
Virtualisation Overview
Virtualisation Overview
Logicalis
Virtualization in Cloud Computing
Virtualization in Cloud Computing
ijtsrd
Quick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-uk
Assespro Nacional
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptx
KelvinBakespear
The Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop Virtualization
HTS Hosting
Sna lab prj (1)
Sna lab prj (1)
alihaider922341
Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.ppt
MohammadArmanulHaque
Virtualization and its Types
Virtualization and its Types
HTS Hosting
Four Main Types of Virtualization
Four Main Types of Virtualization
HTS Hosting
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
aleyeldean
Dz25764770
Dz25764770
IJERA Editor
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
vrickens
Virtualization In Software Testing
Virtualization In Software Testing
Colloquium
Datacenter migration using vmware
Datacenter migration using vmware
Wilson Erique
Ijebea14 260
Ijebea14 260
Iasir Journals
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
Neha417639
Similar a IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
(20)
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
Virtualization - cloud computing
Virtualization - cloud computing
Logicalis - Virtualisation overview
Logicalis - Virtualisation overview
Virtualisation Overview
Virtualisation Overview
Virtualization in Cloud Computing
Virtualization in Cloud Computing
Quick start guide_virtualization_uk_a4_online_2021-uk
Quick start guide_virtualization_uk_a4_online_2021-uk
VIRTUALIZATION for computer science.pptx
VIRTUALIZATION for computer science.pptx
The Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop Virtualization
Sna lab prj (1)
Sna lab prj (1)
Virtualization in Cloud Computing.ppt
Virtualization in Cloud Computing.ppt
Virtualization and its Types
Virtualization and its Types
Four Main Types of Virtualization
Four Main Types of Virtualization
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
Dz25764770
Dz25764770
International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
Virtualization In Software Testing
Virtualization In Software Testing
Datacenter migration using vmware
Datacenter migration using vmware
Ijebea14 260
Ijebea14 260
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
APznzaamT18LaGRvfDd3vc6XGHHoq2hlFqHYsO9vYeEQXTa-sAm9oMvLFaeBQkqdEEa1z4UJVAboW...
Más de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Más de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
University management System project report..pdf
University management System project report..pdf
Kamal Acharya
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
result management system report for college project
result management system report for college project
Tonystark477637
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
Prabhanshu Chaturvedi
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
Último
(20)
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
University management System project report..pdf
University management System project report..pdf
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
result management system report for college project
result management system report for college project
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6558 A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM) Kolla Ranga Dinakar1 1GMR Institute of Technology, Andhra pradesh, India ---------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract:- Cloud computing is a technology which increases the potential of the application in terms of working, elastic resource management and collaborative execution approach. Virtualization is the central part of the cloud computing which allows the dynamic allocation of resources to an industry or to an IT infrastructure. The virtualized system included a software ie, (VMM). Virtual Machine Monitor job is to access the underlying physical host platforms resources. Virtualization or any other technologies have some threats and attacks. This paper surveys types of virtualization, attacks on a hypervisor and some threats. Key Words: Cloud computing, Virtualization, Virtual machine monitor(VMM), Attacks on the cloud, Attacks on virtualization 1. INTRODUCTION: Cloud computing is a technology that offers online services to the consumer on demand that reduces various software program and hardware maintenances for person level. Virtualization allows a couple of instances of an operating to run concurrently on a single computer. It is an abstraction over physical resources to make them shareable among a couple of physical users. For sources to be shareable by means of a range of physical user it allocates a logical name to a bodily aid and enables a pointer to that physical resource on demand. 2. VIRTUALIZATION: Virtualization is a method of how to separate a carrier from the underlying physical shipping of that service. It is the technique of growing a digital model of something like pc hardware. It was once, in the beginning, developed all through the mainframe era. It includes using specialized software to create a virtual or software-created version of a computing resource as a substitute than the genuine version of the equal resource. With the assist of Virtualization, multiple working structures and purposes can run on equal Machine and its identical hardware at the equal time increasing the utilization of hardware. In other words, one of the most important fee effective, hardware reducing, energy saving techniques used by means of cloud vendors is virtualization. Virtualization is a technique, which permits to share a single bodily instance of a resource or a software amongst more than one clients and businesses at one time. It does via assigning a logical identity to bodily storage and imparting a pointer to that physical useful resource on demand. The term virtualization is often synonymous with hardware virtualization, which performs a critical position incorrectly delivering Infrastructure-as-a-Service (IaaS) solutions for cloud computing. Moreover, virtualization applied sciences provide a digital environment for not only executing purposes but also for storage, memory, and networking. Figure 1: Architecture of Virtualization
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6559 2.1 Types of Virtualization: Application virtualization: This is a manner where functions are virtualized and delivered from a server to the give up user’s device, such as laptops, smartphones, and tablets. So as a substitute of logging into their computers at work, users will be capable to gain get admission to the software right from their device, supplied an Internet connection is available. This is mainly famous for agencies that require the use of their purposes on the go. Desktop virtualization: Desktop virtualization is the notion of keeping apart a logical operating system (OS) instance from the patron that is used to get admission to it. Computing device virtualization separates the computing device surroundings from the bodily system and configured as a “virtual laptop infrastructure” (VDI). One of the biggest benefits of laptop virtualization is that users are able to access all their private documents and functions on any PC, meaning they can work from anywhere without the want to deliver their work computer. It also lowers the fee of software licensing and updates. Maintenance and patch administration is simple, seeing that all of the digital pcs are hosted at an identical location. Hardware virtualization: Hardware virtualization, which is also acknowledged as server virtualization or virtually virtualization, is the abstraction of computing assets from the software program that uses these resources. In a usual physical computing environment, a software program such as an operating system (OS) or business enterprise software has direct get admission to the underlying pc hardware and components, such as the processor, memory, storage, certain chipsets, and OS driver versions. This posed foremost headaches for software program configuration and made it difficult to move or reinstall software on unique hardware, such as restoring backups after a fault or disaster. Network virtualization: Network virtualization gathers all physical networking equipment into a single, software-based resource. It also divides available bandwidth into multiple, unbiased channels, every of which can be assigned to servers and systems in real time. Businesses that would gain from community virtualization are ones that have a massive number of customers and need to keep their structures up and running at all times. With the disbursed channels, your network pace will expand dramatically, allowing you to supply services and applications quicker than ever before. Storage virtualization: This kind of virtualization is very convenient and inexpensive to implement because it includes compiling your bodily hard drives into a single cluster. Storage virtualization is available when it comes to planning for disaster recovery, due to the fact that the statistics saved on your virtual storage can be replicated and transferred to every other location. By consolidating your storage into a centralized system, you can cast off the hassles and costs of handling multiple storage devices. Figure 2: Types of virtualization
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6560 3. HYPERVISOR: A Hypervisor is also known as a virtual machine monitor(VMM). It is a piece of code which runs several virtual machines(VMs). A system on which a hypervisor runs one or more virtual machines is known as a host machine, and each virtual machine is known as a visitor machine or guest machine. A system supports several guest virtual machines for sharing of resources like storage, processing. In well-known hypervisors are without delay accountable for web hosting and managing virtual machines on the host or server. The host is another identity for the physical server and hypervisor. The virtual machines that run on the host are called visitor VM or visitor working system. Furthermore, a hypervisor affords a uniform view of the underlying hardware, which capability that it can operate on the hardware of exclusive vendors. Hence, virtual machines can run on any available and supported computers, for the reason that the hypervisor isolates software from hardware. System administrators, who maintain and operate a computer machine and network, are also in a position to view their hardware as a pool of resources, which approves new functionalities that are described in the parent. It shows a number of visitor working system (window, Linux and Mac) are installed on the hypervisor. 3.1Types of Hypervisors: Type 1: (bare metal hypervisor) Type 1 is a hypervisor that is installed at once on the hardware and is also referred to as a “bare-metal” hypervisor. Type 1 hypervisors are basically used on the server market. It is a device that installs without delay on the server hardware layer. These structures are alleviated so as to “focus” on the administration of visitor working structures is to say, those used by using the virtual machines they contain. This releases the best feasible sources for digital machines. However, it is viable to execute only one hypervisor on both the servers. Among type 1 hypervisors there are hypervisors like Xen, VMware ESX and Proxmox. Figure 3: Type 1 Hypervisor Advantages of Type 1 hypervisor: ● Enhance safety ● Allows greater density hardware two ● The hypervisor has direct get admission to the HW Disadvantage of Type 1 hypervisor: ● Need precise HW ● aspect Strict HW ● requirement two More high priced
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6561 Type 2: (Hosted hypervisor) A hypervisor, which runs on a host working gadget that gives virtualization services such as I/O and reminiscence management. This is also recognized as a hosted method Hypervisor. In other phrases, Type 2 hypervisors are positioned between the hardware and virtual machines that are installed on the pinnacle of a running system. In contrast to kind 1, the hypervisor is placed above the running system and not under the operating gadget or digital machines. This allows for an extra running system to be run in virtual surroundings on the pinnacle of an existing operating system. Among the type 2 hypervisor, we locate VMware Player, VMware Workstation and VirtualBox Virtual PC. Figure 4:Type 2 Hypervisor Advantages of Type 2 hypervisor: ● Host OS Controls HW access ● Ease of access ● Allows for more than one running systems Disadvantages of Type 2 hypervisor: ● Decreased security ● Lower VM density ● Needs a host OS first 4. ATTACKS ON CLOUD INFRASTRUCTURE: Figure5: Cloud Infrastructure
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6562 Attacks in the IaaS layer: Infrastructure as a Service is the additional layer between hardware and Operating System in cloud computing. It is built to support and beef up the virtualization technology which will be used by means of the hypervisor. Moreover, virtualization science lets in the administrative operations by means of allowing the introduction of Application Programming Interface (API). The hypervisor attacks are accelerated with the growth of the number of hypervisors. This is because the exploitation of the channels and APIs to the cybercriminals additionally accelerated The VMEscape also can also affect the IaaS layer Attacks in the PaaS layer: Platform as a Service layer is a platform and obligates to guard both the programming framework and runtime engines from the cybercriminals. Hence, the encryption method is adopted in the PaaS layer to secure the customers from any interference from the cybercriminals. Nevertheless, the multitendency assist has led to vulnerability. This is due to the truth that multi-tenancy enables numerous customers from one of a kind structures to use cloud computing at the same time. Therefore, the cybercriminals can also disrupt the execution of the PaaS. Attacks in the SaaS layer: The SaaS layer affords offerings that extract data from more than one sources in cloud computing. The instance of the software is a web application. This has given the opportunity for the cybercriminals to create abnormal conduct of cloud computing by inserting malicious script into the webpage. One of the outstanding attacks in the SaaS layer is SQL injection. In the yr of 2012, LinkedIn was being attacked through the hacker through the SQL injection attack. The facts such as passwords had been possessed by means of the hacker and then published it into the password cracking forum. The victims have been multiplied up to 6.5 million. Therefore, LinkedIn has confronted a million lawsuit due to this problem. 5. ATTACKS ON VIRTUAL MACHINE MONITOR(VMM): Virtualization Attacks One of the top cloud computing threats involves one of its core enabling technologies: virtualization. In virtual environments, the attacker can take control of virtual machines installed by compromising the lower layer hypervisor. It is noticeable that the Cloud Service Provider (CSP) is easily obtainable and this has benefits for both cybercriminals and malevolent users. Hence, the presence of vulnerabilities in the CSP has leveraged the malevolent attacks. Without virtualization, the multiple users to communicate and share similar physical resources are merely impossible. Through the virtualization, the cloud users able to use various applications freely by conducting several useful functions such as migrate, roll back and more in the VMs. In general, the virtualization attacks can be categorized in conventional/traditional attacks and virtualization precise attacks. Insider Virtualization Specific Attacks: Subsequently, the virtualization of particular assaults can further be divided into insider attacks and exterior attacks. The insider assault is described as the malevolent users that equipped and misused their knowledge about the cloud device. This has circuitously influenced the confidentiality, integrity, and availability of the CSP. Moreover, the malevolent customers have triggered the severe danger to the CSP. As the malevolent customers most probable flip into cybercriminals as time passed. The overview of the insider virtualization precise attack is illustrated in the parent Besides the three wonderful insider attacks displayed in the there are other insider attacks, namely the Communication between Virtual Machines and VM Escape. External Virtualization Specific Attacks: The external virtualization particular attacks are defined as any assaults launched by way of both malicious cloud computing users and other external users who have possessed the unauthorized accessibility from the CSP. It is observable that the strategies of three notable exterior assaults such as Breakout attack, External Modification of Virtual Machines and Hypervisor attack. Co-Residential Attacks: Co-Residential Attacks are frequently used in Virtual Machine Allocation Policies in Cloud Computing. The co-residential attack, where malicious users construct side channels and extract the data from virtual machines co-located on the identical server. The intruder is capable to extricate any personal statistics or statistics from the victim, need to co-locate the VMs with the target VMs. A virtual cloud aid allocation model is proposed. In this, the trouble of virtual cloud sources allocation is abstracted as a utility-maximization problem, making trade-offs between the utility of the data middle and the performance of the purposes into account, and maximizing the utility on the premise of meeting user’s performance. Cache-Based Side-Channel Attacks: Resource sharing in cloud computing raises a problem of Cache-Based Side Channel Attack (CSCA). It is proposed to observe and forestall visitor virtual machines from CSCA. Cache omit patterns had been analyzed in this answer to realize aspect channel attack. CSCA is divided into two types and those are time pushed cache
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6563 attacks and hint driven cache attacks. It is primarily based on a cloud setting with two VMs installed on an equal physical machine using bare-metal hypervisor sharing best possible level cache. 6. Conclusion: In conclusion, virtualization is a key enabling technology of the cloud, permitting many guest machines to share the same physical hardware. The hypervisor is supposed to be secure from assaults and efficiently isolate the VMs, yet potential security flaws are evident. VM break out is the most serious of all the assaults mentioned due to the fact the escaped VM would be free to compromise all the other co-resident VMs. Solving the VM escape problem ought to probably require a paradigm shift in the structure and sketch of hypervisors. Other assaults that focus on stealing facts via side-channels can be mitigated by adding noise to the side-channel. Solving the problem of hypervisor security is an vital step in imparting a secure cloud surroundings for agencies and buyers to utilize. REFERENCES: [1]M. Watson, N. Shirazi, A. Marnerides, A. Mauthe, and D. Hutchison, “Malware Detection In Cloud Computing Infrastructures”, IEEE Transactions on Dependable and Secure Computing, vol13, no. 2, pp. 192-205, 2016. [2] S. Jin, J. Ahn, J.Seol, S. Cha, J. Huh and S. Maeng, “ H-SVM: Hardware-Assisted Secure Virtual Machines Under A Vulnerable Hypervisor”, IEEE Transactions on Computers, vol64, no. 10, pp. 2833-2846, 2015. [3] A. Riddle, and S. Chung, “A Survey on the Security of Hypervisors in Cloud Computing”, 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015. [4] Ajay Kumara M. A and Jaidhar C. D, “Hypervisor and Virtual Machine Dependent Intrusion Detection and Prevention System for Virtualized Cloud Environment”, 2015 1st International Conference on Telematics and Future Generation Networks (TAFGEN), 2015 [5] O. Agesen, A. Garthwaite, J. Sheldon, and P. Subrahmanyam. The evolution of an x86 virtual machine monitor. ACM SIGOPS Operating Systems Review, 44(4):3–18, 2010. . [6] Secure virtualization for cloud computing".Flavio Lombardi, Roberto Di Pietro, June 2010. [7] Shyam Patidar; Dheeraj Rane; Pritesh Jain “A Survey Paper on Cloud Computing” in a proceeding of Second International Conference on Advanced Computing & Communication Technologies, 2012 [8] T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” 2010 24th IEEE International Conference on Advanced Information Networking and Applications(AINA), pp. 27-33, DOI= 20-23 April 2010 [9] VMware (2009).History of virtualization. DOI= http:// www. Vmware.com /virtualization/ history. html. [10] Mell, P., Grance, T., & Grance, T. (n.d.). The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology. [11] Tan, S. (2010). Forecast: Understanding the Opportunities in Virtualization Consulting and Implementation Services. Gartner. Publication Date: 11 March 2010, ID Number: G00174840 [12] Ramos,S.J.C.C. 2009).Security Challenges with Virtualization. Thesis, December 2009, DOI = http: // docs. di .fc.ul. pt/jspui/bitstream / 10455/3282/1/Thesis – Jramos FCUL.pdf [13] Chowdhury, M. K.; Boutaba, R. (2009). A survey of network virtualization. Elsevier. Computer Network 54(2010) 862-876 [14] Goldberg, R.P. (1974). Survey of virtual machine research. Computer, pages 34–45, 1974
Descargar ahora