Security architecture for virtual machines

Udaya Tupakula*, Vijay Varadharajan, Abhishek Bichhawat

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

1 Citation (Scopus)

Abstract

We propose security architecture based on virtual machine monitor to efficiently deal with attacks on virtual machines. We will show that our model is capable of detecting suspicious processes running in the virtual machine, can detect and prevent different types of attacks including zero day attacks by monitoring the virtual machine traffic and the processes that are generating or receiving the traffic. The architecture also makes use of sharing information about the suspicious behaviour among multiple Intrusion detection systems deployed in different virtual machine monitors. We describe the implementation of the proposed architecture and present a detailed analysis of how our architecture can be used to detect zero day attacks.

Original languageEnglish
Title of host publicationAlgorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP 2011, Proceedings, Part 1
EditorsYang Xiang, Alfredo Cuzzocrea, Michael Hobbs, Wanlei Zhou
Place of PublicationHeidelberg, Germany
PublisherSpringer, Springer Nature
Pages218-229
Number of pages12
Volume7016 LNCS
ISBN (Print)9783642246494
DOIs
Publication statusPublished - 2011
Event11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2011 - Melbourne, VIC, Australia
Duration: 24 Oct 201126 Oct 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 1
Volume7016 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2011
Country/TerritoryAustralia
CityMelbourne, VIC
Period24/10/1126/10/11

Fingerprint

Dive into the research topics of 'Security architecture for virtual machines'. Together they form a unique fingerprint.

Cite this