Critical Analysis on Detection and Mitigation of Security Vulnerabilities in Virtualization Data Centers

نویسندگان

چکیده

There is an increasing demand for IT resources in growing business enterprises. Data center virtualization helps to meet this by driving higher server utilization and utilizing un-used CPU cycles without causes much increase new servers. Reduction infrastructure complexities, Optimization of cost system management, power cooling are some the additional benefits virtualization. Virtualization also brings various security vulnerabilities. They prone attacks like hyperjacking, intrusion, data thefts, denial service on virtualized servers web facing applications etc. This works identifies challenges A critical analysis existing state art detection mitigation vulnerabilities presented. The aim identify open issues propose prospective solutions brief these issues.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Virtualization Security in Data Centers and Clouds

In the past decade, with the unprecedented growth in tech companies and advances in cloud computing, it has become increasingly common for companies to incorporate virtualization in their data centers to fully utilize their hardware resources. As a result, virtualization and virtualization security have gone through major transforms in the recent years. Virtualization and its unique architectur...

متن کامل

a critical discourse analysis on gender representation in the iranian english books 2, 3 and top notch 2a, 2b a critical discourse analysis perspective

هدف از انجام تحقیق حاضر، مطالعه و بررسی نقش زنان و مردان در دو مجموعه از کتابهای درسی انگلیسی در قالب تحلیل گفتمان انتقادی و همچنین، بررسی و آشکار ساختن اصول ایدوئولوژیکی مربوط به نقش زنان و مردان در این کتابها است. این دو مجموعه کتاب عبارتنداز: کتابهای انگلیسی سال دوم و سوم دبیرستانی ایران و کتابهای تاپ ناچ 2آ و 2ب. برای انجام این منظور، مدل تحلیل گفتمان انتقادی فرکلاف مورد استفاده قرار گرفته ...

15 صفحه اول

C2Hunter: Detection and Mitigation of Covert Channels in Data Centers

Data centers provides both the applications, systems software and the hardware as services over the Internet, which is named cloud computing [1–3]. It is core infrastructure of cloud computing, supporting dynamic deployment and elastic resource management. With the powerful computing and storing capabilities, cloud computing has become increasingly popular [4, 5]. The fundamental mechanism of c...

متن کامل

Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing

The paper proposes a security testing technique to detect known vulnerabilities of web applications using both static and dynamic analysis. We also present a process to improve the security of web applications by mitigating many of the vulnerabilities revealed in the testing phase, and address a new method for detecting unknown vulnerabilities by applying dynamic black-box testing based on a fu...

متن کامل

Critical Success Factors for Data Virtualization: A Literature Review

Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach in the first stage to get a state of the art of DV regarding data integration and to present a concept matrix. We extend the knowledge base with a systematic literature review ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Recent and Innovation Trends in Computing and Communication

سال: 2023

ISSN: ['2321-8169']

DOI: https://doi.org/10.17762/ijritcc.v11i3s.6187