Filters








162,733 Hits in 4.0 sec

Resource usage monitoring for KVM based virtual machines

Ankit Anand, Mohit Dhingra, J. Lakshmi, S. K. Nandy
2012 2012 18th International Conference on Advanced Computing and Communications (ADCOM)  
In this paper, we present a performance monitoring tool for KVM based virtualized machines, which measures the CPU overhead incurred by the hypervisor on behalf of the virtual machine along-with the CPU  ...  usage of virtual machine itself.  ...  On such virtualized servers, physical hardware is shared among multiple virtual machines by a layer called hypervisor or virtual machine monitor(VMM).  ... 
doi:10.1109/adcom.2012.6563586 fatcat:ff4t54folfhajnnrzipwtdqyei

The Quest-V Separation Kernel for Mixed Criticality Systems [article]

Ye Li, Richard West, Eric Missimer
2013 arXiv   pre-print
Mixed criticality systems and services can then co-exist on the same platform in separate virtual machines.  ...  In this paper, we discuss the design of the Quest-V separation kernel, that partitions services of different criticalities in separate virtual machines, or sandboxes.  ...  Mixed criticality systems and services can then co-exist on the same platform in separate virtual machines.  ... 
arXiv:1310.6298v1 fatcat:4j6l2hun6vgsfp5dmo46yrza2q

Narrowing the generation gap between virtual machines and minicomputers

Henry J. Theberge, Eric E. Beaverstock
1974 Proceedings of the May 6-10, 1974, national computer conference and exposition on - AFIPS '74  
The firmware passes control to the virtual machine monitor when virtual machine functions are required.  ...  Since the virtual machine monitor is written in TRAIL, monitoring and debugging is readily accomplished.  ... 
doi:10.1145/1500175.1500234 dblp:conf/afips/ThebergeB74 fatcat:6nkvl4krbbgrfbetviyjhxzaka

XNetMon: A Network Monitor for Securing Virtual Networks

Natalia Castro Fernandes, Otto Carlos Muniz Bandeira Duarte
2011 2011 IEEE International Conference on Communications (ICC)  
The network monitor controls the use of shared resources and punishes misbehaving virtual routers, guaranteeing an isolated operation of the virtual networks.  ...  We propose a network monitor for Xen to increase the isolation and the performance on packet forwarding.  ...  XNetMon guarantees a secure communication between virtual routers and Dom0, controls plane separation, and monitors the Dom0 resource consumption caused by each individual virtual router, ensuring that  ... 
doi:10.1109/icc.2011.5963443 dblp:conf/icc/FernandesD11 fatcat:tfeaj5jovjay5jazjutyhxmyua

Virtualization Effects on The Security

2020 Journal of science and technolgy  
virtualization machine environment that would not affect the trusted information with the same system  ...  The classical definition suggest that try to detect the security violations at the first place and then take the action but with the virtualization we can create the separate environment for security related  ...  (PlOS(m)) for k<m VMM (1) means a virtual machine monitor, virtual machines.  ... 
doi:10.46243/jst.2020.v6.i1.pp01-08 fatcat:uuhpdjnwvbed7i37gxeuttnrry

A security model for virtual infrastructure in the cloud

Roya Morshedi
2016 International Journal of Computer Applications Technology and Research  
This ensures higher accuracy virtualization and cloud infrastrure components of the virtual machines is.  ...  It seems that virtual machine monitors are equivalent to the host operating system, but not so in terms of hardware are separated.  ...  A virtual machine is the logical equivalent of a physical hardware and more virtual machines on a single hardware logically separate spaces and can be used in a network as separate systems.  ... 
doi:10.7753/ijcatr0502.1003 fatcat:ryrb7caj4rftpiruqhmozq4dku

Scalable Monitoring Analytics Architecture in Software-Defined Infrastructure

Jieyu Lin, Byungchul Park, Qi Zhang, Hadi Bannazadeh, Alberto Leon-Garcia
2015 Proceedings of the 10th EAI International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities  
Flexible analytics capability and scalability of MonArch is demonstrated through two use cases: virtual machine communication analysis and anomaly detection.  ...  Software-Defined Infrastructure provides a unified architecture for integrated management of virtualized heterogeneous resources in cloud infrastructures.  ...  Figure 2 : 2 MonArch Detail Figure 3 : 3 Virtual Machine Communication Graph  ... 
doi:10.4108/icst.tridentcom.2015.260151 dblp:journals/ue/LinPZBL15 fatcat:kwvyp7zqznertamxjo5zyhhnem

Securing virtual machine monitors

Paul A. Karger
2009 Proceedings of the 4th International Symposium on Information, Computer, and Communications Security - ASIACCS '09  
It is widely believed that the use of a virtual machine monitor (VMM) is at least as secure, if not more secure than separate systems.  ...  What Madnick and Donovan were actually talking about was not that any one particular virtual machine was more secure, but rather that a small secure virtual machine monitor can improve the security of  ...  Categories and Subject Descriptors monitors, hypervisors, security kernels  ... 
doi:10.1145/1533057.1533059 dblp:conf/ccs/Karger09 fatcat:ouvsvwvlx5ckvdugtcw24r5ipi

A conceptual model of self-monitoring multi-core systems

Dipankar Dasgupta, Harkeerat Bedi, Deon Garrett
2010 Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '10  
Accordingly, a many-core system is vertically partitioned (from hardware to application level) so that a small set of processors (security core) is separated from other user data processing cores to build  ...  The paper discusses a conceptual model of building a selfmonitoring mechanism in a multi-core system such that the health of the entire system can be monitored securely and in an implicit manner.  ...  Garfinkel and Rosenblum [12] developed a virtual machine introspection (VMM or VMI) technique for inspecting a virtual machine from the outside providing strong isolation of IDS from the host it is monitoring  ... 
doi:10.1145/1852666.1852760 dblp:conf/csiirw/DasguptaBG10 fatcat:wb2zj3j36zcx3oqzkgqkooov6i

Survey: Virtual Machine Introspection Techniques for Safety Applications for Root kit Attack Recognition

Prof. Anita V. Shinde
2019 International Journal for Research in Applied Science and Engineering Technology  
This survey involves existing virtual machine introspection tools is required to address different techniques research and focus on some key features that are useful for wide application of virtual machine  ...  Virtual machine introspection has gain a special attention in different domain of computer security.  ...  [6] Virtual Machine Introspection (VMI) is a technique that enables monitoring of virtual machines at the hypervisor layer.  ... 
doi:10.22214/ijraset.2019.2091 fatcat:fkagmzhfdrdzjh7h36aupwys6e

A SNMP-Based Virtual Machines Management Interface

Ricardo Hillbrecht, Luis Carlos E. de Bona
2012 2012 IEEE Fifth International Conference on Utility and Cloud Computing  
Virtual-Machines-MIB aims to define a standard interface for virtual machines management, allowing the management of several virtual machines monitors, like Xen, KVM and VMWare, with a common SNMP management  ...  Different from previous virtual machines management MIBs, which allows the manager to perform only monitoring operations, Virtual-Machines-MIB allows to perform control operations, like create, delete,  ...  XenMIB also has separate groups for data about the physical machine and data about the virtual machines.  ... 
doi:10.1109/ucc.2012.31 dblp:conf/ucc/HillbrechtB12 fatcat:of6e2tlkhvb6rarfwo67qneb34

Virtualization Layer Security in Cloud Architecture

S. Jyothsna, Department of IT, CVR College of Engineering, Ibrahimpatnam, Hyderabad, India
2015 CVR Journal of Science & Technology  
The architecture of processor supports the ability to run number of virtual machine instructions on one CPU after virtualization.  ...  Hypervisor is a program responsible for allocation and de allocation of resources to each virtual machine (VM) connected to the cloud.  ...  Hypervisor does not function natively on the host and can only access host resources through a separate control layer commonly named the virtual machine monitor (VMM).  ... 
doi:10.32377/cvrjst0813 fatcat:tgevoikefvau3ofbnxchezop64

A secure OSGi environment for untrusted web applications

Timo Aho, Johannes Koskinen, Antti Nieminen
2013 Proceedings of the Second Nordic Symposium on Cloud Computing & Internet Technologies - NordiCloud '13  
In this case, the OSGi specification is arguably the number one choice for running multiple applications on a single Java virtual machine.  ...  Moreover, we distinguish each web session of an application while competing methods only monitor complete applications as single entities.  ...  Even if the web applications were distributed in the different Java virtual machines so that each web application is executed by separated virtual machines in cloud environment, closing one of the JVMs  ... 
doi:10.1145/2513534.2513539 dblp:conf/nordicloud/AhoKN13 fatcat:6lqfg3xhsrasvas6r6av7bastq

Implementation levels of virtualization and security issues in cloud computing

A Banushri, Dr R. A. Karthika
2018 International Journal of Engineering & Technology  
It supports multiple OS run on single physical machine called host machine and multiple guest application run on single server called host server.  ...  This paper provides the information about the implementation levels of virtualization, the benefits and security problems of Virtualization in virtualized hardware environment.  ...  help of technology called virtual machine monitor (VMM).  ... 
doi:10.14419/ijet.v7i2.33.15474 fatcat:p3km5ab3lngu3clpxudbf4667u

A virtualized separation kernel for mixed criticality systems

Ye Li, Richard West, Eric Missimer
2014 Proceedings of the 10th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE '14  
Mixed criticality systems and services can then coexist on the same platform in separate virtual machines.  ...  In this paper, we discuss the design of the Quest-V separation kernel, which partitions services of different criticalities in separate virtual machines, or sandboxes.  ...  The system avoids traps into a hypervisor (a.k.a. virtual machine monitor, or VMM) when making scheduling and I/O management decisions.  ... 
doi:10.1145/2576195.2576206 dblp:conf/vee/LiWM14 fatcat:45qwdhhv3zhc5hnnxltelqvkum
« Previous Showing results 1 — 15 out of 162,733 results