Filters








1,357 Hits in 5.2 sec

Securing KVM Based Virtual Machine Monitoring System for Handling and Detection of Rootkit Attack

Vijay Pardeshi
<span title="2018-04-30">2018</span> <i title="International Journal for Research in Applied Science and Engineering Technology (IJRASET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hsp44774azcezeyiq4kuzpfh5a" style="color: black;">International Journal for Research in Applied Science and Engineering Technology</a> </i> &nbsp;
Virtual machine introspection (VMI) is the mechanism which allows indirect inspection and management of the status of virtual machines.  ...  Indirection of this approach offers attractive isolation properties which have resulted in a variety of VMIbased applications for security, performance, and debugging in virtual machine environments.  ...  [2] Paper "Leveraging Derivative Virtual Machine Introspection Methods for Security Applications", describes malware detection that makes use of a support vector machine (SVM) to classify system call  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22214/ijraset.2018.4275">doi:10.22214/ijraset.2018.4275</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/azvbktwcvbf7xb2yn5ovvbb3dq">fatcat:azvbktwcvbf7xb2yn5ovvbb3dq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200213005500/http://ijraset.com/fileserve.php?FID=15879" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b3/4a/b34abb0467f34b5cfc6e4ba5995cbb580848bcee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22214/ijraset.2018.4275"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Towards High Assurance Networks of Virtual Machines [chapter]

Fabrizio Baiardi, Daniele Sgandurra
<span title="">2009</span> <i title="Springer US"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/buexlaapefetfatuvtspxuwmve" style="color: black;">Lecture Notes in Electrical Engineering</a> </i> &nbsp;
Multi-Level Approach to Intrusion Detection Semantic gap: introspection can access only raw data.  ...  Virtual Machine Introspection Psyco-Virt Chain of Trust 8/29 Fabrizio Baiardi, Daniele Sgandurra Towards High Assurance Networks of Virtual Machines Problem Overall Architecture Evaluation  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-85555-4_2">doi:10.1007/978-0-387-85555-4_2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mrpogjtihjarpbndqltj5koxke">fatcat:mrpogjtihjarpbndqltj5koxke</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810221420/http://www.di.unipi.it/~daniele/publications/ec2nd2007-slides.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/56/51/56513c248f72f541ce9fabbc66bc6903cef25df5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-85555-4_2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection

Huseyn Huseynov, Tarek Saadawi, Kenichi Kourai
<span title="2021-10-08">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tdvcddxjjzfavkwy267ww7wn5m" style="color: black;">Big Data and Cognitive Computing</a> </i> &nbsp;
Since MEC application instantiated in the virtualized infrastructure, in this paper we present a distributed application that aims to constantly introspect multiple virtual machines (VMs) in order to detect  ...  Developed software is able to detect keyloggers, rootkits, trojans, process hiding and other intrusion artifacts via agent-less operation, by operating remotely or directly from the host machine.  ...  Proposed approach relies on Artificial Immune System based intrusion detection with built-in automated virtual machine introspection module.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/bdcc5040052">doi:10.3390/bdcc5040052</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lugaxvqiyfcbbnmnpvx7ygpnsy">fatcat:lugaxvqiyfcbbnmnpvx7ygpnsy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211008082131/https://mdpi-res.com/d_attachment/BDCC/BDCC-05-00052/article_deploy/BDCC-05-00052.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/08/91/0891892ce670794252e30fd928dd4b35f7a22d9e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/bdcc5040052"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

A formal model for virtual machine introspection

Jonas Pfoh, Christian Schneider, Claudia Eckert
<span title="">2009</span> <i title="ACM Press"> Proceedings of the 1st ACM workshop on Virtual machine security - VMSec &#39;09 </i> &nbsp;
Virtual machine introspection (VMI) describes the method of monitoring and analyzing the state of a virtual machine from the hypervisor level.  ...  Finally, we describe and discuss an ideal VMI-based intrusion detection system using our model and begin to detail the practical implications in building such a system.  ...  VIRTUAL MACHINE INTROSPECTION Introspection is a synonym for self-examination.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1655148.1655150">doi:10.1145/1655148.1655150</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sn2zjg5eunfmxhqnoluvhtrdla">fatcat:sn2zjg5eunfmxhqnoluvhtrdla</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200320225018/http://www.cs.jhu.edu/~sdoshi/jhuisi650/papers/spimacs/SPIMACS_CD/vmsec/p1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/79/7c/797c06c57bba47b6b738ae55431292f144ff3379.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1655148.1655150"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Secure and Flexible Monitoring of Virtual Machines

Bryan D. Payne, Martim D. P. De A. Carbone, Wenke Lee
<span title="">2007</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5i22f6noqzcuzalvmf6ckdmcmy" style="color: black;">Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)</a> </i> &nbsp;
In this paper we propose a set of requirements that should guide the development of virtual machine monitoring solutions.  ...  properly build a monitoring architecture.  ...  Acknowledgments This material is based upon work supported in part by the National Science Foundation under Grant No. CNS-0627430.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/acsac.2007.10">doi:10.1109/acsac.2007.10</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/acsac/PayneL07.html">dblp:conf/acsac/PayneL07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/76xhenczczgpjjmpn2l6cxibfe">fatcat:76xhenczczgpjjmpn2l6cxibfe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705161727/http://www.utdallas.edu/~mxk055100/courses/cloud11f_files/138.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/74/5d/745d603917d3527e7643bc6053ebad7db18033a7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/acsac.2007.10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Secure and Flexible Monitoring of Virtual Machines

Bryan D. Payne, Wenke Lee
<span title="">2007</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/c2syobe3wnconhocjx2ad2tkka" style="color: black;">Proceedings of the Computer Security Applications Conference</a> </i> &nbsp;
In this paper we propose a set of requirements that should guide the development of virtual machine monitoring solutions.  ...  properly build a monitoring architecture.  ...  Acknowledgments This material is based upon work supported in part by the National Science Foundation under Grant No. CNS-0627430.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/acsac.2007.4413005">doi:10.1109/acsac.2007.4413005</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5ywjkaz4cbdc5l6rvwm4hwtjaa">fatcat:5ywjkaz4cbdc5l6rvwm4hwtjaa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705161727/http://www.utdallas.edu/~mxk055100/courses/cloud11f_files/138.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/74/5d/745d603917d3527e7643bc6053ebad7db18033a7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/acsac.2007.4413005"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Review: A Study on Malware Detection in Cloud Network Targeting Cloud Infrastructures

<span title="">2017</span> <i title="S N Education Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xssnslyscvcnljolhqnk36bj3i" style="color: black;">International Journal of Innovations in Engineering and Technology</a> </i> &nbsp;
In a cloud network, the resources are provided to the end user in the form of virtual machines, which make them vulnerable to malware exploits, VM Escape based attacks and even distributed denial of service  ...  However detection capabilities of tradition host based anti-virus is limited and these software fails to detect many threats and complexity of latest attacks are increasing which evade the traditional  ...  presented Virtual Machine VM "CloudIDEA:A Malware the a malware defense architecture in Introspection introspection of Defense Architecture for the form of security as service model through LIbVMI Cloud  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21172/ijiet.81.030">doi:10.21172/ijiet.81.030</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gqk2jwtvj5ee3nutt64wsgyo7e">fatcat:gqk2jwtvj5ee3nutt64wsgyo7e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602145313/http://ijiet.com/wp-content/uploads/2017/03/30.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/06/f406b6c49f025c9c8a69262cab8ff6678c3a18db.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21172/ijiet.81.030"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

CloudIDEA: A Malware Defense Architecture for Cloud Data Centers [chapter]

Andreas Fischer, Thomas Kittel, Bojan Kolosnjaji, Tamas K. Lengyel, Waseem Mandarawi, Hermann de Meer, Tilo Müller, Mykola Protsenko, Hans P. Reiser, Benjamin Taubmann, Eva Weishäupl
<span title="">2015</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This paper presents CloudIDEA, an architecture that provides a security service for malware defense in cloud environments.  ...  In an Infrastructure-as-a-Service (IaaS) cloud, malware located in a customer's virtual machine (VM) affects not only this customer, but may also attack the cloud infrastructure and other co-hosted customers  ...  virtual machine introspection (VMI).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-26148-5_40">doi:10.1007/978-3-319-26148-5_40</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mk7ojldplzdvtm5vvid6bmnxj4">fatcat:mk7ojldplzdvtm5vvid6bmnxj4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922030707/https://epub.uni-regensburg.de/32761/1/CloudIDEA.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/aa/6e/aa6ea612c11eecb5eee91902a756778716b5b982.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-26148-5_40"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Virtual machine introspection: towards bridging the semantic gap

Asit More, Shashikala Tapaswi
<span title="2014-10-25">2014</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/t5xopidd6nfk7cgyceba77n2xe" style="color: black;">Journal of Cloud Computing: Advances, Systems and Applications</a> </i> &nbsp;
Virtual machine introspection is a technique used to inspect and analyse the code running on a given virtual machine.  ...  A survey of existing virtual machine introspection tools is necessary to address various possible research gaps and to focus on key features required for wide application of virtual machine introspection  ...  Acknowledgements Authors are grateful to the reviewers of this manuscript for their expert advice.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13677-014-0016-2">doi:10.1186/s13677-014-0016-2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ma6yudxz7ja4zhfnji4mearrzy">fatcat:ma6yudxz7ja4zhfnji4mearrzy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190417042128/https://core.ac.uk/download/pdf/81272883.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f3/cb/f3cbed481dde5acdf88011ed20655a7e001c0c24.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13677-014-0016-2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

Concurrent and consistent virtual machine introspection with hardware transactional memory

Yutao Liu, Yubin Xia, Haibing Guan, Binyu Zang, Haibo Chen
<span title="">2014</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/n7ljjecrpje5pj66pk4pvx65qu" style="color: black;">2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA)</a> </i> &nbsp;
Virtual machine introspection, which provides tamperresistant, high-fidelity "out of the box" monitoring of virtual machines, has many prominent security applications including VM-based intrusion detection  ...  We have implemented and evaluated TxIntro based on Xen VMM on a commodity Intel Haswell machine that provides restricted transactional memory (RTM) support.  ...  This work is supported by a research grant from Huawei Technologies, Inc., a grant from Shanghai Science and Technology Development Funds (No. 12QA1401700), a foundation for the Author of National Excellent  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/hpca.2014.6835951">doi:10.1109/hpca.2014.6835951</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/hpca/LiuXGZC14.html">dblp:conf/hpca/LiuXGZC14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wcai2c5ytjajnmzjb3jsciy7wa">fatcat:wcai2c5ytjajnmzjb3jsciy7wa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810113209/http://ipads.se.sjtu.edu.cn/lib/exe/fetch.php?media=publications:tx-intro.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8f/98/8f985906cce2c7bbc49ed90ff4bb1887249ae613.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/hpca.2014.6835951"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Natural Language Processing based Anomalous System Call Sequences Detection with Virtual Memory Introspection

Suresh K. Peddoju, Himanshu Upadhyay, Jayesh Soni, Nagarajan Prabakar
<span title="">2020</span> <i title="The Science and Information Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2yzw5hsmlfa6bkafwsibbudu64" style="color: black;">International Journal of Advanced Computer Science and Applications</a> </i> &nbsp;
In this paper, an anomaly detection method is implemented using Natural Language Processing (NLP) based on Bags of System Calls (BoSC) for learning the behavior of applications on Windows virtual machines  ...  Malware has become a significant problem for the security of computers in this scientific era.  ...  Virtual Machine Introspection (VMI) is the most versatile malware detection technique to monitor and analyze cyber threats on virtual machines [1] [2] [3] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2020.0110559">doi:10.14569/ijacsa.2020.0110559</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/56lrkfvthncrfplr2htxh4e2nq">fatcat:56lrkfvthncrfplr2htxh4e2nq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200604044629/https://thesai.org/Downloads/Volume11No5/Paper_59-Natural_Language_Processing_based_Anomalous_System.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/26/de/26de3fec5a5e8e1f30ed130362cf0b32966e0011.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2020.0110559"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Virtual Machine Introspection

Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/isugvl4gxbamjcpfoy6usp7xj4" style="color: black;">Proceedings of the 7th International Conference on Security of Information and Networks - SIN &#39;14</a> </i> &nbsp;
VIRTUAL MACHINE INTROSPECTION VMI inspects the VM memory and disk from the outside without intrusively injecting agents.  ...  Thus, there is a need to detect Denial of Service (DoS) attacks coming from virtual machines especially attacks which will not normally be detected by intrusion detection systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2659651.2659710">doi:10.1145/2659651.2659710</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sin/WinTMSR14.html">dblp:conf/sin/WinTMSR14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hpddpuxxnzgprpcinfwp6ioqqu">fatcat:hpddpuxxnzgprpcinfwp6ioqqu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721172122/http://eprints.glos.ac.uk/4162/7/Virtual%20Machine%20Introspection.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/65/0f/650fea79ffb001078b78770af14bd5632c453beb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2659651.2659710"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A Centralized Monitoring Mechanism in Virtualized Environments

Yandong Han, Zhiyu Hao, Lei Cui, Chonghua Wang
<span title="2017-04-10">2017</span> <i title="DEStech Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/oepoggqi3bgnbds2j2j6zruxjy" style="color: black;">DEStech Transactions on Engineering and Technology Research</a> </i> &nbsp;
From the perspective of system architecture, the distributed monitoring method is not conducive to a cloud platform provider for unified management of computing resources, and the monitoring behavior in  ...  the physical host of monitored virtual machine will consume a lot of limited computing and storage resources on the virtual machine server, thus occupying the limited service resources of the virtual  ...  ACKNOWLEDGEMENT We would like to thank the anonymous reviewers for their valuable comments and help in improving this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12783/dtetr/iceta2016/6965">doi:10.12783/dtetr/iceta2016/6965</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jtkcad35frc6veqizoxipsy5de">fatcat:jtkcad35frc6veqizoxipsy5de</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428134806/http://dpi-proceedings.com/index.php/dtetr/article/download/6965/6557" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/4b/d54b53715fbd720c7b73f3240d7a941717ff643a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12783/dtetr/iceta2016/6965"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

ProMoX: A protocol stack monitoring framework

Elias Weingärtner, Christoph Terwelp, Klaus Wehrle
<span title="2010-02-13">2010</span> <i title="European Association of Software Science and Technology"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ds6dyxrqzrddpmxtwf2p5ljfn4" style="color: black;">Electronic Communications of the EASST</a> </i> &nbsp;
By utilizing system virtualization for external monitoring, ProMoX can transparently inspect any protocol state and performance metrics of protocol implementations carried by a guest operating system.  ...  In this paper, we present a preliminary glance on our framework for protocol stack monitoring using Xen (ProMoX).  ...  A popular application area for virtual machine introspection is intrusion detection as first proposed in [6] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14279/tuj.eceasst.17.217">doi:10.14279/tuj.eceasst.17.217</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/eceasst/WeingartnerTW09.html">dblp:journals/eceasst/WeingartnerTW09</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uvggkfjqgjgszjuuqo4my7pr44">fatcat:uvggkfjqgjgszjuuqo4my7pr44</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706032019/https://journal.ub.tu-berlin.de/eceasst/article/download/217/215/" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7f/48/7f480fcd6a7e7028a89bafc5390f679e49bdca76.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14279/tuj.eceasst.17.217"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Novel Approach for Intrusion Detection and Prevention Technique for Cloud based on FVM Approach

Rameshwari Malik
<span title="2015-05-20">2015</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
issue have high probability can be classified using Bayesian classifier .An intrusion detection system proposed for monitoring the network against malicious attack .  ...  Security is major challenge in cloud computing .This paper proposed the creation of FVM(forensic virtual machine ) so that each virtual machine can be used as different security issue and which security  ...  FVM FVMs are small Virtual Machines (VM) that can monitor other VMs to discover the symptoms in real-time via Virtual Machine Introspection (VMI).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/20710-3029">doi:10.5120/20710-3029</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f5kt4ofiibfjxhoufs5bpsjv3e">fatcat:f5kt4ofiibfjxhoufs5bpsjv3e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602150245/https://research.ijcaonline.org/volume118/number1/pxc3903029.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2a/fa/2afaf22866aa8a1d8ef9e0ffe04b2b82348f1f0a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/20710-3029"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 1,357 results