A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Resource usage monitoring for KVM based virtual machines
2012
2012 18th International Conference on Advanced Computing and Communications (ADCOM)
In this paper, we present a performance monitoring tool for KVM based virtualized machines, which measures the CPU overhead incurred by the hypervisor on behalf of the virtual machine along-with the CPU ...
usage of virtual machine itself. ...
On such virtualized servers, physical hardware is shared among multiple virtual machines by a layer called hypervisor or virtual machine monitor(VMM). ...
doi:10.1109/adcom.2012.6563586
fatcat:ff4t54folfhajnnrzipwtdqyei
The Quest-V Separation Kernel for Mixed Criticality Systems
[article]
2013
arXiv
pre-print
Mixed criticality systems and services can then co-exist on the same platform in separate virtual machines. ...
In this paper, we discuss the design of the Quest-V separation kernel, that partitions services of different criticalities in separate virtual machines, or sandboxes. ...
Mixed criticality systems and services can then co-exist on the same platform in separate virtual machines. ...
arXiv:1310.6298v1
fatcat:4j6l2hun6vgsfp5dmo46yrza2q
Narrowing the generation gap between virtual machines and minicomputers
1974
Proceedings of the May 6-10, 1974, national computer conference and exposition on - AFIPS '74
The firmware passes control to the virtual machine monitor when virtual machine functions are required. ...
Since the virtual machine monitor is written in TRAIL, monitoring and debugging is readily accomplished. ...
doi:10.1145/1500175.1500234
dblp:conf/afips/ThebergeB74
fatcat:6nkvl4krbbgrfbetviyjhxzaka
XNetMon: A Network Monitor for Securing Virtual Networks
2011
2011 IEEE International Conference on Communications (ICC)
The network monitor controls the use of shared resources and punishes misbehaving virtual routers, guaranteeing an isolated operation of the virtual networks. ...
We propose a network monitor for Xen to increase the isolation and the performance on packet forwarding. ...
XNetMon guarantees a secure communication between virtual routers and Dom0, controls plane separation, and monitors the Dom0 resource consumption caused by each individual virtual router, ensuring that ...
doi:10.1109/icc.2011.5963443
dblp:conf/icc/FernandesD11
fatcat:tfeaj5jovjay5jazjutyhxmyua
Virtualization Effects on The Security
2020
Journal of science and technolgy
virtualization machine environment that would not affect the trusted information with the same system ...
The classical definition suggest that try to detect the security violations at the first place and then take the action but with the virtualization we can create the separate environment for security related ...
(PlOS(m)) for k<m VMM (1) means a virtual machine monitor, virtual machines. ...
doi:10.46243/jst.2020.v6.i1.pp01-08
fatcat:uuhpdjnwvbed7i37gxeuttnrry
A security model for virtual infrastructure in the cloud
2016
International Journal of Computer Applications Technology and Research
This ensures higher accuracy virtualization and cloud infrastrure components of the virtual machines is. ...
It seems that virtual machine monitors are equivalent to the host operating system, but not so in terms of hardware are separated. ...
A virtual machine is the logical equivalent of a physical hardware and more virtual machines on a single hardware logically separate spaces and can be used in a network as separate systems. ...
doi:10.7753/ijcatr0502.1003
fatcat:ryrb7caj4rftpiruqhmozq4dku
Scalable Monitoring Analytics Architecture in Software-Defined Infrastructure
2015
Proceedings of the 10th EAI International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities
Flexible analytics capability and scalability of MonArch is demonstrated through two use cases: virtual machine communication analysis and anomaly detection. ...
Software-Defined Infrastructure provides a unified architecture for integrated management of virtualized heterogeneous resources in cloud infrastructures. ...
Figure 2 : 2 MonArch Detail
Figure 3 : 3 Virtual Machine Communication Graph ...
doi:10.4108/icst.tridentcom.2015.260151
dblp:journals/ue/LinPZBL15
fatcat:kwvyp7zqznertamxjo5zyhhnem
Securing virtual machine monitors
2009
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security - ASIACCS '09
It is widely believed that the use of a virtual machine monitor (VMM) is at least as secure, if not more secure than separate systems. ...
What Madnick and Donovan were actually talking about was not that any one particular virtual machine was more secure, but rather that a small secure virtual machine monitor can improve the security of ...
Categories and Subject Descriptors monitors, hypervisors, security kernels ...
doi:10.1145/1533057.1533059
dblp:conf/ccs/Karger09
fatcat:ouvsvwvlx5ckvdugtcw24r5ipi
A conceptual model of self-monitoring multi-core systems
2010
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '10
Accordingly, a many-core system is vertically partitioned (from hardware to application level) so that a small set of processors (security core) is separated from other user data processing cores to build ...
The paper discusses a conceptual model of building a selfmonitoring mechanism in a multi-core system such that the health of the entire system can be monitored securely and in an implicit manner. ...
Garfinkel and Rosenblum [12] developed a virtual machine introspection (VMM or VMI) technique for inspecting a virtual machine from the outside providing strong isolation of IDS from the host it is monitoring ...
doi:10.1145/1852666.1852760
dblp:conf/csiirw/DasguptaBG10
fatcat:wb2zj3j36zcx3oqzkgqkooov6i
Survey: Virtual Machine Introspection Techniques for Safety Applications for Root kit Attack Recognition
2019
International Journal for Research in Applied Science and Engineering Technology
This survey involves existing virtual machine introspection tools is required to address different techniques research and focus on some key features that are useful for wide application of virtual machine ...
Virtual machine introspection has gain a special attention in different domain of computer security. ...
[6] Virtual Machine Introspection (VMI) is a technique that enables monitoring of virtual machines at the hypervisor layer. ...
doi:10.22214/ijraset.2019.2091
fatcat:fkagmzhfdrdzjh7h36aupwys6e
A SNMP-Based Virtual Machines Management Interface
2012
2012 IEEE Fifth International Conference on Utility and Cloud Computing
Virtual-Machines-MIB aims to define a standard interface for virtual machines management, allowing the management of several virtual machines monitors, like Xen, KVM and VMWare, with a common SNMP management ...
Different from previous virtual machines management MIBs, which allows the manager to perform only monitoring operations, Virtual-Machines-MIB allows to perform control operations, like create, delete, ...
XenMIB also has separate groups for data about the physical machine and data about the virtual machines. ...
doi:10.1109/ucc.2012.31
dblp:conf/ucc/HillbrechtB12
fatcat:of6e2tlkhvb6rarfwo67qneb34
Virtualization Layer Security in Cloud Architecture
2015
CVR Journal of Science & Technology
The architecture of processor supports the ability to run number of virtual machine instructions on one CPU after virtualization. ...
Hypervisor is a program responsible for allocation and de allocation of resources to each virtual machine (VM) connected to the cloud. ...
Hypervisor does not function natively on the host and can only access host resources through a separate control layer commonly named the virtual machine monitor (VMM). ...
doi:10.32377/cvrjst0813
fatcat:tgevoikefvau3ofbnxchezop64
A secure OSGi environment for untrusted web applications
2013
Proceedings of the Second Nordic Symposium on Cloud Computing & Internet Technologies - NordiCloud '13
In this case, the OSGi specification is arguably the number one choice for running multiple applications on a single Java virtual machine. ...
Moreover, we distinguish each web session of an application while competing methods only monitor complete applications as single entities. ...
Even if the web applications were distributed in the different Java virtual machines so that each web application is executed by separated virtual machines in cloud environment, closing one of the JVMs ...
doi:10.1145/2513534.2513539
dblp:conf/nordicloud/AhoKN13
fatcat:6lqfg3xhsrasvas6r6av7bastq
Implementation levels of virtualization and security issues in cloud computing
2018
International Journal of Engineering & Technology
It supports multiple OS run on single physical machine called host machine and multiple guest application run on single server called host server. ...
This paper provides the information about the implementation levels of virtualization, the benefits and security problems of Virtualization in virtualized hardware environment. ...
help of technology called virtual machine monitor (VMM). ...
doi:10.14419/ijet.v7i2.33.15474
fatcat:p3km5ab3lngu3clpxudbf4667u
A virtualized separation kernel for mixed criticality systems
2014
Proceedings of the 10th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE '14
Mixed criticality systems and services can then coexist on the same platform in separate virtual machines. ...
In this paper, we discuss the design of the Quest-V separation kernel, which partitions services of different criticalities in separate virtual machines, or sandboxes. ...
The system avoids traps into a hypervisor (a.k.a. virtual machine monitor, or VMM) when making scheduling and I/O management decisions. ...
doi:10.1145/2576195.2576206
dblp:conf/vee/LiWM14
fatcat:45qwdhhv3zhc5hnnxltelqvkum
« Previous
Showing results 1 — 15 out of 162,733 results