TY - JOUR
T1 - Network and hypervisor-based attacks in cloud computing environments
AU - Montasari, Reza
AU - Macdonald, Stuart
AU - Hosseinian-Far, Amin
AU - Carroll, Fiona
AU - Daneshkhah, Alireza
N1 - Publisher Copyright:
© 2021 Inderscience Enterprises Ltd.
PY - 2021/10/28
Y1 - 2021/10/28
N2 - Cloud computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to its rapid adoption by businesses and governments worldwide. Despite the many technological and economic benefits that CC offers, at the same time, it poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. Therefore, to create a practical understanding of such threats, this paper provides an analysis of common and underexplored network- and hypervisor-based attacks against CC systems from a technical viewpoint.
AB - Cloud computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to its rapid adoption by businesses and governments worldwide. Despite the many technological and economic benefits that CC offers, at the same time, it poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. Therefore, to create a practical understanding of such threats, this paper provides an analysis of common and underexplored network- and hypervisor-based attacks against CC systems from a technical viewpoint.
KW - Artificial intelligence
KW - Big data
KW - Cyber physical systems
KW - Cyber security
KW - Digital forensics
KW - Machine learning
KW - Threat intelligence
UR - http://www.scopus.com/inward/record.url?scp=85118896772&partnerID=8YFLogxK
U2 - 10.1504/ijesdf.2021.118549
DO - 10.1504/ijesdf.2021.118549
M3 - Article
AN - SCOPUS:85118896772
SN - 1751-911X
VL - 13
SP - 630
EP - 651
JO - International Journal of Electronic Security and Digital Forensics
JF - International Journal of Electronic Security and Digital Forensics
IS - 6
ER -