2014 IEEE 3rd International Conference on Cloud Networking (CloudNet) 2014
DOI: 10.1109/cloudnet.2014.6968968
|View full text |Cite
|
Sign up to set email alerts
|

Assessing the impact of intra-cloud live migration on anomaly detection

Abstract: Abstract-Virtualized cloud environments have emerged as a necessity within modern unified ICT infrastructures and have established themselves as a reliable backbone for numerous alwayson services. 'Live' intra-cloud virtual-machine (VM) migration is a widely used technique for efficient resource management employed within modern cloud infrastructures. Despite the benefits of such functionality, there are still several security issues which have not yet been thoroughly assessed and quantified. We investigate th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
3

Relationship

2
8

Authors

Journals

citations
Cited by 29 publications
(23 citation statements)
references
References 11 publications
0
23
0
Order By: Relevance
“…The method is embodied by a resilience architecture that was initially defined in [4], further explored in [36], [37] and which comprises the System Analysis Engine (SAE) and Network Analysis Engine (NAE) components. These exist as submodules of the architecture's Cloud Resilience Managers (CRMs), which perform detection at the end-system, and in the network respectively.…”
Section: Discussionmentioning
confidence: 99%
“…The method is embodied by a resilience architecture that was initially defined in [4], further explored in [36], [37] and which comprises the System Analysis Engine (SAE) and Network Analysis Engine (NAE) components. These exist as submodules of the architecture's Cloud Resilience Managers (CRMs), which perform detection at the end-system, and in the network respectively.…”
Section: Discussionmentioning
confidence: 99%
“…The method is embodied by a resilience architecture that was initially defined in (Simpson et al, 2013) and further explored in (Shirazi et al, 2014) and (Shirazi et al, 2015).…”
Section: Monitoring Solutionmentioning
confidence: 99%
“…However, there is still need to apply basic of policy refinement principals for autonomic management in cloud computing. The motivation for the work presented here comes from the previous work [8], [9] and objectives of the project SECCRIT 1 which state:…”
Section: Fig 1: Policy Refinement Stagesmentioning
confidence: 99%