Browse > Article

A Study against Attack using Virtualization Weakness  

Yang, Hwan Seok (중부대학교 정보보호학과)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.8, no.3, 2012 , pp. 57-64 More about this Journal
Abstract
Computing environment combined with development of internet and IT technology is changing to cloud computing environment. In addition, cloud computing is revitalized more because of propagation of LTE and suggestion of N-screen Service. Virtualization is the point technology for suggest IT resource to service form to users in this cloud computing. This technology combines other system physically or divides one system logically and uses resource efficiently. Many users can be provided application and hardware as needed using this. But, lately various attack using weak point of virtualization technology are increasing rapidly. In this study, we analyze type and weak point of virtualization technology, the point of cloud computing. And we study about function and the position which intrusion detection system has to prepare in order to detect and block attack using this.
Keywords
Virtualization; Cloud Computing; Intrusion Detection System;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Popovic and Z. Hocenski, "Cloud Computing Security Issues and Challenges," In MIPRO, 2010 Proceedings of the 33rd International Convention, 2010, pp. 344-349.
2 M. Jensen, N. Gruschka, L. L. Iacono, and G. Horst, "On Technical Security Issues in Cloud Computing," IEEE International Conference on Cloud Computing, 2009, pp. 109-116.
3 B. R. Kandukuri, R. Paturi, A. Rakshit, "Cloud Security Issues," In Proceedings of IEEE International Conference on Services Computing, 2009, pp. 517-520.
4 K. Vieira, A. Schulter, C. B. Westphall, and C. M. Westphall, "Intrusion Detection for Grid and Cloud Computing," IT Professional, Vol. 12, 2010, pp. 38-43.
5 정성민, 김태경, "효율적인 클라우드 컴퓨팅을 위한 가상장비 할당 방법," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 73-79.
6 A. Bakshi and Yogesh B, "Securing Cloud from DDoS Attacks using Intrusion Detection System in Virtual Machine," In Second International Conference on Communication Software and Networks, Singapore, 2010, pp. 260-264.
7 최윤정, "침입탐지시스템의 정확도 향상을 위한 개선된 데이터마이닝 방법론," 디지털정보산업학회지, 제6권, 제1호, 2010, pp. 1-12.
8 M. I. Sharif, W. Lee, W. D. Cui, A. Lanzi, "Secure In-VM Monitoring Using Hardware Virtualization," In Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009, pp. 477-487.
9 Ch. Lo, Ch. Huang and J. Ku, "A Cooperative Intrusion Detection System Framework for Cloud Computing Networks," In 39th International Conference on Parallel Processing Workshops, 2010, pp. 280-284.