Virtual Instance

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 90 Experts worldwide ranked by ideXlab platform

Bernd Freisleben - One of the best experts on this subject based on the ideXlab platform.

  • PDP - Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments
    2011 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing, 2011
    Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd Freisleben
    Abstract:

    The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.

  • Malware detection and kernel rootkit prevention in cloud computing environments
    Proceedings - 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing PDP 2011, 2011
    Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd Freisleben
    Abstract:

    The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.

Jacky Keung - One of the best experts on this subject based on the ideXlab platform.

  • Empirical prediction models for adaptive resource provisioning in the cloud
    Future Generation Computer Systems, 2020
    Co-Authors: Sadeka Islam, Jacky Keung
    Abstract:

    Cloud computing allows dynamic resource scaling for enterprise online transaction systems, one of the key characteristics that differentiates the cloud from the traditional computing paradigm. However, initializing a new Virtual Instance in a cloud is not instantaneous; cloud hosting platforms introduce several minutes delay in the hardware resource allocation. In this paper, we develop prediction-based resource measurement and provisioning strategies using Neural Network and Linear Regression to satisfy upcoming resource demands. Experimental results demonstrate that the proposed technique offers more adaptive resource management for applications hosted in the cloud environment, an important mechanism to achieve on-demand resource allocation in the cloud.

  • An empirical study into adaptive resource provisioning in the cloud
    2010
    Co-Authors: Sadeka Islam, Jacky Keung
    Abstract:

    Cloud computing allows dynamic resource scaling for enterprise online transaction systems, one of the key characteristics that differentiates cloud from the traditional computing paradigm. However, initializing a new Virtual Instance in cloud is not instantaneous; the cloud hosting platforms introduce significant delay in the hardware resource allocation. In this paper, we develop prediction-based resource measurement and provisioning strategies using Neural Network and Linear Regression to satisfy upcoming resource demands. Experimental results demonstrate that the proposed technique offers more adaptive resource management for applications hosted in cloud environment, an important mechanism to achieve on-demand resource allocation in the cloud.

Matthias Schmidt - One of the best experts on this subject based on the ideXlab platform.

  • PDP - Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments
    2011 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing, 2011
    Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd Freisleben
    Abstract:

    The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.

  • Malware detection and kernel rootkit prevention in cloud computing environments
    Proceedings - 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing PDP 2011, 2011
    Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd Freisleben
    Abstract:

    The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.

Pablo Graubner - One of the best experts on this subject based on the ideXlab platform.

  • PDP - Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments
    2011 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing, 2011
    Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd Freisleben
    Abstract:

    The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.

  • Malware detection and kernel rootkit prevention in cloud computing environments
    Proceedings - 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing PDP 2011, 2011
    Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd Freisleben
    Abstract:

    The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.

David Bock - One of the best experts on this subject based on the ideXlab platform.

  • PDP - Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments
    2011 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing, 2011
    Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd Freisleben
    Abstract:

    The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.

  • Malware detection and kernel rootkit prevention in cloud computing environments
    Proceedings - 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing PDP 2011, 2011
    Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd Freisleben
    Abstract:

    The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.