Abstract
Virtualization is the tool to offer data center resources to remote users. Virtualization brings higher resource utilization by sharing large physical resource to multiple users in form of virtual machines. The advantages of virtualization are overshadowed by various attacks like hyper jacking, intrusion, data thefts, etc. Co-location is the security loop hole most adopted by attackers to launch such attacks. This work proposes a hidden Markov model (HMM)-assisted proactive vulnerability mitigation mechanism by effective control of VM placements to defend against co-location attacks. The mechanism monitors VM/user behavior continuously and classifies the behavior of VM into security risk labels. Based on the risk label, VM placement is adapted to reduce the probability of vulnerability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bari MF et al (2013) Data center network virtualization: a survey. IEEE Commun Surv Tutorials 15(2), pp 909–928(Second Quarter)
Alouane M, El Bakkali H (2016) Virtualization in cloud computing: NoHype vs HyperWall new approach. In: 2016 International conference on electrical and information technologies (ICEIT), pp 49–54.
Bari MF, Boutaba R, Esteves R, Granville LZ, Podlesny M, Rabbani MG, Zhang Qi, Zhani MF (2013) Data center network virtualization: a survey. IEEE Commun Surv Tutorials 15:909–928
Liang X, Gui X, Jian AN, Ren D (2017) Mitigating cloud co-resident attacks via grouping-based virtual machine placement strategy 1–8. https://doi.org/10.1109/PCCC.2017.8280448
Agarwal A, Binh Duong TN (2018) Co-Location resistant virtual machine placement in cloud data centers. In: IEEE 24th international conference on parallel and distributed systems (ICPADS) pp 61–68
Qiu Y, Shen Q, Luo Y, Li C, Wu Z (2017) A secure virtual machine deployment strategy to reduce co-residency in cloud. In: Trustcom/BigDataSE/ICESS, 2017. IEEE, pp 347–354
Berrima M, Nasr AK, Ben Rajeb N (2016) Co-location resistant strategy with full resources optimization. In: Proceedings of the 2016 ACM on cloud computing security workshop, pp 3–10
Natu V, Duong TN (2017) Secure virtual machine placement in infrastructure cloud services. In: 10th IEEE Conference on service-oriented computing and applications, pp 26–33
Han Y, Chan J, Alpcan T, Leckie C (2017) Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Trans Dependable Secure Comput 14(1):95–108
Aldawood M, Jhumka A, Fahmy SA (2021) Sit here: placing virtual machines securely in cloud environments. https://doi.org/10.5220/0010459202480259
Han Y, Alpcan T, Chan J, Leckie C, Rubinstein BI (2015) A game theoretical approach to defend against co-resident attacks in cloud computing: Preventing co-residence using semi-supervised learning. IEEE Trans Inf Forensics Secur 11(3):556–570
Saxena D, Gupta I, Kumar J, Singh AK, Wen X (2021) A secure and multi-objective virtual machine placement framework for cloud data centre.
Chhabra S, Singh AK (2020) A secure VM allocation scheme to preserve against co-resident threat. Int J Web Eng Technol 15(1):96–115
Long VD, Duong TN (2020) Group instance: flexible co-location resistant virtual machine placement in IaaS clouds. In: 2020 IEEE 29th international conference on enabling technologies: infrastructure for collaborative enterprises (WETICE), pp 64–69
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Manikandan, J., SriLaskhmi, U. (2023). HMM-Assisted Proactive Vulnerability Mitigation in Virtualization Datacenter Though Controlled VM Placement. In: Khanna, A., Polkowski, Z., Castillo, O. (eds) Proceedings of Data Analytics and Management . Lecture Notes in Networks and Systems, vol 572. Springer, Singapore. https://doi.org/10.1007/978-981-19-7615-5_32
Download citation
DOI: https://doi.org/10.1007/978-981-19-7615-5_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7614-8
Online ISBN: 978-981-19-7615-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)