Cyber Security Aspects of Virtualization in Cloud Computing Environments

Author(s):  
Darshan Mansukhbhai Tank ◽  
Akshai Aggarwal ◽  
Nirbhay Kumar Chaubey

Cybercrime continues to emerge, with new threats surfacing every year. Every business, regardless of its size, is a potential target of cyber-attack. Cybersecurity in today's connected world is a key component of any establishment. Amidst known security threats in a virtualization environment, side-channel attacks (SCA) target most impressionable data and computations. SCA is flattering major security interests that need to be inspected from a new point of view. As a part of cybersecurity aspects, secured implementation of virtualization infrastructure is very much essential to ensure the overall security of the cloud computing environment. We require the most effective tools for threat detection, response, and reporting to safeguard business and customers from cyber-attacks. The objective of this chapter is to explore virtualization aspects of cybersecurity threats and solutions in the cloud computing environment. The authors also discuss the design of their novel ‘Flush+Flush' cache attack detection approach in a virtualized environment.

Author(s):  
Darshan Mansukhbhai Tank ◽  
Akshai Aggarwal ◽  
Nirbhay Kumar Chaubey

Cybercrime continues to emerge, with new threats surfacing every year. Every business, regardless of its size, is a potential target of cyber-attack. Cybersecurity in today's connected world is a key component of any establishment. Amidst known security threats in a virtualization environment, side-channel attacks (SCA) target most impressionable data and computations. SCA is flattering major security interests that need to be inspected from a new point of view. As a part of cybersecurity aspects, secured implementation of virtualization infrastructure is very much essential to ensure the overall security of the cloud computing environment. We require the most effective tools for threat detection, response, and reporting to safeguard business and customers from cyber-attacks. The objective of this chapter is to explore virtualization aspects of cybersecurity threats and solutions in the cloud computing environment. The authors also discuss the design of their novel ‘Flush+Flush' cache attack detection approach in a virtualized environment.


Cloud computing has made life easier for user and business. The “cloud” is a server where data, applications and software are stored and can be accessed from any device as long as we have internet connection. Nowadays, security is the main issue in the cloud computing environment because cyber crime is increasing abruptly. The main motive of this paper is to reduce the cyber crime in cloud computing. Cyber crime is the phenomenon which interrupts the privacy and security for data storage, to overcome this cyber security is introduced. Cyber security is protection from unauthorized access that aimed to exploitation from attackers which destroys information system. The inference of this paper is to focus on authentication mechanisms for providing security and preventing cyber crime activities in the cloud


Author(s):  
Lawan Ahmed Mohammed

Computer crime is now becoming a major international problem, with continual increases in incidents of cracking, hacking, viruses, worms, bacteria and the like having been reported in recent years. As a result of this massive vulnerabilities and new intrusion techniques, the rate of cybercrime has accelerated beyond imagination. In recent years, cloud computing have become ubiquitous, permeating every aspect of our personal and professional lives. Governments and enterprises are now adopting cloud technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness. It is therefore vital to find ways of reducing and controlling the risk associated with such activities especially in cloud computing environment. However, there is no perfect-safe way to protect against all cyber attacks, hence, there is need for a proper recovery planning in the event of disaster resulting from these attacks. In this chapter, several means of limiting vulnerabilities and minimizing damages to information systems are discussed.


2018 ◽  
pp. 1318-1333
Author(s):  
Lawan A. Mohammed

Computer crime is now becoming a major international problem, with continual increases in incidents of cracking, hacking, viruses, worms, bacteria and the like having been reported in recent years. As a result of this massive vulnerabilities and new intrusion techniques, the rate of cybercrime has accelerated beyond imagination. In recent years, cloud computing have become ubiquitous, permeating every aspect of our personal and professional lives. Governments and enterprises are now adopting cloud technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness. It is therefore vital to find ways of reducing and controlling the risk associated with such activities especially in cloud computing environment. However, there is no perfect-safe way to protect against all cyber attacks, hence, there is need for a proper recovery planning in the event of disaster resulting from these attacks. In this chapter, several means of limiting vulnerabilities and minimizing damages to information systems are discussed.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1914
Author(s):  
Moslem Dehghani ◽  
Taher Niknam ◽  
Mohammad Ghiasi ◽  
Navid Bayati ◽  
Mehdi Savaghebi

Nowadays, the role of cyber-physical systems (CPSs) is of paramount importance in power system security since they are more vulnerable to different cyber-attacks. Detection of cyber-attacks on a direct current microgrid (DC-MG) has become a pivotal issue due to the increasing use of them in various electrical engineering applications, from renewable power generations to the distribution of electricity and power system of public transportation and subway electric network. In this study, a novel strategy was provided to diagnose possible false data injection attacks (FDIA) in DC-MGs to enhance the cyber-security of electrical systems. Accordingly, to diagnose cyber-attacks in DC-MG and to identify the FDIA to distributed energy resource (DER) unit, a new procedure of wavelet transform (WT) and singular value decomposition (SVD) based on deep machine learning was proposed. Additionally, this paper presents a developed selective ensemble deep learning (DL) approach using the gray wolf optimization (GWO) algorithm to identify the FDIA in DC-MG. In the first stage, in the paper, to gather sufficient data within the ordinary performance required for the training of the DL network, a DC-MG was operated and controlled with no FDIAs. In the information generation procedure, load changing was considered to have diagnosing datasets for cyber-attack and load variation schemes. The obtained simulation results were compared with the new Shallow model and Hilbert Huang Transform methods, and the results confirmed that the presented approach could more precisely and robustly identify multiple forms of FDIAs with more than 95% precision.


Sign in / Sign up

Export Citation Format

Share Document