Virtualization Host

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 36 Experts worldwide ranked by ideXlab platform

Hartmut König - One of the best experts on this subject based on the ideXlab platform.

  • LCN - An SDN-based Approach to Protect Communication Between Virtual Machines
    2019 IEEE 44th Conference on Local Computer Networks (LCN), 2019
    Co-Authors: Radoslaw Cwalinski, René Rietz, Michael Vogel, Hartmut König
    Abstract:

    As a result of the increasing Virtualization of computer systems, areas arise in corporate networks and cloud environments that are insufficiently supervised by established security mechanisms, such as firewalls or network monitoring. Conventional firewalls cannot protect Virtual Machines (VMs) because the communication between them runs only within the Virtualization server/Host. Thus, virtualized systems represent blind spots for network monitoring. They are particularly susceptible to attacks on the data link and network layers (L2/L3 attacks). Software-Defined Networking (SDN) provides the opportunity to better control communication relationships. In this paper, we present an SDN-based approach to protect the communication between VMs on a Virtualization Host which preserves the multi-gigabit throughput of interconnected VMs.

Radoslaw Cwalinski - One of the best experts on this subject based on the ideXlab platform.

  • LCN - An SDN-based Approach to Protect Communication Between Virtual Machines
    2019 IEEE 44th Conference on Local Computer Networks (LCN), 2019
    Co-Authors: Radoslaw Cwalinski, René Rietz, Michael Vogel, Hartmut König
    Abstract:

    As a result of the increasing Virtualization of computer systems, areas arise in corporate networks and cloud environments that are insufficiently supervised by established security mechanisms, such as firewalls or network monitoring. Conventional firewalls cannot protect Virtual Machines (VMs) because the communication between them runs only within the Virtualization server/Host. Thus, virtualized systems represent blind spots for network monitoring. They are particularly susceptible to attacks on the data link and network layers (L2/L3 attacks). Software-Defined Networking (SDN) provides the opportunity to better control communication relationships. In this paper, we present an SDN-based approach to protect the communication between VMs on a Virtualization Host which preserves the multi-gigabit throughput of interconnected VMs.

René Rietz - One of the best experts on this subject based on the ideXlab platform.

  • LCN - An SDN-based Approach to Protect Communication Between Virtual Machines
    2019 IEEE 44th Conference on Local Computer Networks (LCN), 2019
    Co-Authors: Radoslaw Cwalinski, René Rietz, Michael Vogel, Hartmut König
    Abstract:

    As a result of the increasing Virtualization of computer systems, areas arise in corporate networks and cloud environments that are insufficiently supervised by established security mechanisms, such as firewalls or network monitoring. Conventional firewalls cannot protect Virtual Machines (VMs) because the communication between them runs only within the Virtualization server/Host. Thus, virtualized systems represent blind spots for network monitoring. They are particularly susceptible to attacks on the data link and network layers (L2/L3 attacks). Software-Defined Networking (SDN) provides the opportunity to better control communication relationships. In this paper, we present an SDN-based approach to protect the communication between VMs on a Virtualization Host which preserves the multi-gigabit throughput of interconnected VMs.

Michael Vogel - One of the best experts on this subject based on the ideXlab platform.

  • LCN - An SDN-based Approach to Protect Communication Between Virtual Machines
    2019 IEEE 44th Conference on Local Computer Networks (LCN), 2019
    Co-Authors: Radoslaw Cwalinski, René Rietz, Michael Vogel, Hartmut König
    Abstract:

    As a result of the increasing Virtualization of computer systems, areas arise in corporate networks and cloud environments that are insufficiently supervised by established security mechanisms, such as firewalls or network monitoring. Conventional firewalls cannot protect Virtual Machines (VMs) because the communication between them runs only within the Virtualization server/Host. Thus, virtualized systems represent blind spots for network monitoring. They are particularly susceptible to attacks on the data link and network layers (L2/L3 attacks). Software-Defined Networking (SDN) provides the opportunity to better control communication relationships. In this paper, we present an SDN-based approach to protect the communication between VMs on a Virtualization Host which preserves the multi-gigabit throughput of interconnected VMs.

Tigano Danilo - One of the best experts on this subject based on the ideXlab platform.

  • An innovative approach to performance metrics calculus in cloud computing environments: a guest-to-Host oriented perspective
    'Wiley', 2018
    Co-Authors: Tigano Danilo
    Abstract:

    In virtualized systems, the task of profiling and resource monitoring is not straight-forward. Many datacenters perform CPU overcommittment using hypervisors, running multiple virtual machines on a single computer where the total number of virtual CPUs exceeds the total number of physical CPUs available. From a customer point of view, it could be indeed interesting to know if the purchased service levels are effectively respected by the cloud provider. The innovative approach to performance profiling described in this work is based on the use of virtual performance counters, only recently made available by some hypervisors to their virtual machines, to implement guest-wide profiling. Although it isn't possible for the virtual machine to access Virtual Machine Monitor, with this method it is able to gather interesting informations to deduce the state of resource overcommittment of the Virtualization Host where it is executed. Tests have been carried out inside the compute nodes of FIWARE Genoa Node, an instance of a widely distributed federated community cloud, based on OpenStack and KVM. AgiLab-DITEN, the laboratory I belonged to and where I conducted my studies, together with TnT-Lab\u2013DITEN and CNIT-GE-Unit designed, installed and configured the whole Genoa Node, that was Hosted on DITEN-UniGE equipment rooms. All the software measuring instruments, operating systems and programs used in this research are publicly available and free, and can be easily installed in a micro instance of virtual machine, rapidly deployable also in public clouds