2017
DOI: 10.5120/ijca2017915204
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Study on Security Vulnerabilities in Virtualization at Cloud Computing

Abstract: Virtualization is the process of creating a virtual representation of architecture. It has advantages on five components; sharing, isolation, aggregation, dynamics, and ease of management. However, issues that rise due to the nature of virtualization, especially security issues has skyrocketed. To counter this, a number of solutions has been presented in multiple literature. In this paper, a new solution to improve the security of the system is proposed. In addition, the flaws of the current implemented system… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…The selected features and decision trees were employed to detect irregular anomalies in the traffic flow. So far, approaches based on machine learning for DDOS attack detection have proved beneficial in protecting the cloud [15]. In this study, we propose to implement the ensemble approach for DDOS attack detection.…”
Section: Related Workmentioning
confidence: 99%
“…The selected features and decision trees were employed to detect irregular anomalies in the traffic flow. So far, approaches based on machine learning for DDOS attack detection have proved beneficial in protecting the cloud [15]. In this study, we propose to implement the ensemble approach for DDOS attack detection.…”
Section: Related Workmentioning
confidence: 99%