No Cover Image

Journal article 1034 views 332 downloads

Network and Hypervisor-Based Attacks in Cloud Computing Environments

Reza Montasari Orcid Logo, Stuart Macdonald Orcid Logo, Amin Hosseinian Far, Fiona Carroll, Alireza Daneshkhah

International Journal of Electronic Security and Digital Forensics, Volume: 13, Issue: 6

Swansea University Authors: Reza Montasari Orcid Logo, Stuart Macdonald Orcid Logo

Abstract

Cloud Computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to it...

Full description

Published in: International Journal of Electronic Security and Digital Forensics
ISSN: 1751-911X 1751-9128
Published: Inderscience Publishers 2021
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa55398
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2020-10-12T09:19:11Z
last_indexed 2023-03-21T04:10:11Z
id cronfa55398
recordtype SURis
fullrecord <?xml version="1.0" encoding="utf-8"?><rfc1807 xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"><bib-version>v2</bib-version><id>55398</id><entry>2020-10-12</entry><title>Network and Hypervisor-Based Attacks in Cloud Computing Environments</title><swanseaauthors><author><sid>e420369ac98aaaa7f39248e39a847af1</sid><ORCID>0000-0001-7136-6753</ORCID><firstname>Reza</firstname><surname>Montasari</surname><name>Reza Montasari</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2020-10-12</date><deptcode>SOSS</deptcode><abstract>Cloud Computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to its rapid adoption by businesses and governments worldwide. Despite the many technological and economic benefits that CC offers, at the same time, it poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. Therefore, to create a practical understanding of such threats, this paper provides an analysis of common and underexplored network- and hypervisor-based attacks against CC systems from a technical viewpoint.</abstract><type>Journal Article</type><journal>International Journal of Electronic Security and Digital Forensics</journal><volume>13</volume><journalNumber>6</journalNumber><paginationStart/><paginationEnd/><publisher>Inderscience Publishers</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>1751-911X</issnPrint><issnElectronic>1751-9128</issnElectronic><keywords/><publishedDay>28</publishedDay><publishedMonth>10</publishedMonth><publishedYear>2021</publishedYear><publishedDate>2021-10-28</publishedDate><doi>10.1504/ijesdf.2021.10036493</doi><url/><notes/><college>COLLEGE NANME</college><department>Social Sciences School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SOSS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2024-10-18T09:59:40.3444407</lastEdited><Created>2020-10-12T10:15:57.2169832</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Reza</firstname><surname>Montasari</surname><orcid>0000-0001-7136-6753</orcid><order>1</order></author><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>2</order></author><author><firstname>Amin Hosseinian</firstname><surname>Far</surname><order>3</order></author><author><firstname>Fiona</firstname><surname>Carroll</surname><order>4</order></author><author><firstname>Alireza</firstname><surname>Daneshkhah</surname><order>5</order></author></authors><documents><document><filename>55398__18403__8835ad9aeb5f47f29527ba8627cdc087.pdf</filename><originalFilename>Network and Hypervisor-Based Attacks.pdf</originalFilename><uploaded>2020-10-12T10:18:23.1642588</uploaded><type>Output</type><contentLength>753357</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><embargoDate>2022-10-28T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807>
spelling v2 55398 2020-10-12 Network and Hypervisor-Based Attacks in Cloud Computing Environments e420369ac98aaaa7f39248e39a847af1 0000-0001-7136-6753 Reza Montasari Reza Montasari true false 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2020-10-12 SOSS Cloud Computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to its rapid adoption by businesses and governments worldwide. Despite the many technological and economic benefits that CC offers, at the same time, it poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. Therefore, to create a practical understanding of such threats, this paper provides an analysis of common and underexplored network- and hypervisor-based attacks against CC systems from a technical viewpoint. Journal Article International Journal of Electronic Security and Digital Forensics 13 6 Inderscience Publishers 1751-911X 1751-9128 28 10 2021 2021-10-28 10.1504/ijesdf.2021.10036493 COLLEGE NANME Social Sciences School COLLEGE CODE SOSS Swansea University 2024-10-18T09:59:40.3444407 2020-10-12T10:15:57.2169832 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Reza Montasari 0000-0001-7136-6753 1 Stuart Macdonald 0000-0002-7483-9023 2 Amin Hosseinian Far 3 Fiona Carroll 4 Alireza Daneshkhah 5 55398__18403__8835ad9aeb5f47f29527ba8627cdc087.pdf Network and Hypervisor-Based Attacks.pdf 2020-10-12T10:18:23.1642588 Output 753357 application/pdf Accepted Manuscript true 2022-10-28T00:00:00.0000000 true eng
title Network and Hypervisor-Based Attacks in Cloud Computing Environments
spellingShingle Network and Hypervisor-Based Attacks in Cloud Computing Environments
Reza Montasari
Stuart Macdonald
title_short Network and Hypervisor-Based Attacks in Cloud Computing Environments
title_full Network and Hypervisor-Based Attacks in Cloud Computing Environments
title_fullStr Network and Hypervisor-Based Attacks in Cloud Computing Environments
title_full_unstemmed Network and Hypervisor-Based Attacks in Cloud Computing Environments
title_sort Network and Hypervisor-Based Attacks in Cloud Computing Environments
author_id_str_mv e420369ac98aaaa7f39248e39a847af1
933e714a4cc37c3ac12d4edc277f8f98
author_id_fullname_str_mv e420369ac98aaaa7f39248e39a847af1_***_Reza Montasari
933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald
author Reza Montasari
Stuart Macdonald
author2 Reza Montasari
Stuart Macdonald
Amin Hosseinian Far
Fiona Carroll
Alireza Daneshkhah
format Journal article
container_title International Journal of Electronic Security and Digital Forensics
container_volume 13
container_issue 6
publishDate 2021
institution Swansea University
issn 1751-911X
1751-9128
doi_str_mv 10.1504/ijesdf.2021.10036493
publisher Inderscience Publishers
college_str Faculty of Humanities and Social Sciences
hierarchytype
hierarchy_top_id facultyofhumanitiesandsocialsciences
hierarchy_top_title Faculty of Humanities and Social Sciences
hierarchy_parent_id facultyofhumanitiesandsocialsciences
hierarchy_parent_title Faculty of Humanities and Social Sciences
department_str Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law
document_store_str 1
active_str 0
description Cloud Computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to its rapid adoption by businesses and governments worldwide. Despite the many technological and economic benefits that CC offers, at the same time, it poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. Therefore, to create a practical understanding of such threats, this paper provides an analysis of common and underexplored network- and hypervisor-based attacks against CC systems from a technical viewpoint.
published_date 2021-10-28T09:59:38Z
_version_ 1813241637378195456
score 11.037319