Virtualization Security

Rishabh Mishra, DSITM,GHAZIABAD,UP; Abhinav Mishra ,NIELIT

Virtualization, attacks, sniffing, hypervisor, vm, vdi

The recent form of change in working on resources and platform introduced the term virtualization. Virtualization comes with its own merits and challenges. As it hides physical characteristics of the resources and the concept of encapsulation comes into picture. Hypervisor based architecture requires fewer hardware resources and can communicate more efficiently. All major players have introduced their hypervisor based solution to the virtualization. One of the challenges comes with it is the virtualization security.
    [1] Edward L. Haletky. Secure Hybrid Cloud Reference Architecture, The Virtualization Practice, LLC(www.virtualizationpractice.com); Version 1.1 (September 2012) [2] Edward L. Haletky. VMware vSphere(TM) and Virtual Infrastructure Security: Securing the VirtualEnvironment, Prentice Hall PTR; 1 edition (June, 2009) [3] Trend Micro Deep Security Reference Architecture for the Secure Hybrid CloudEdward L. Haletky Analyst – Virtualization and Cloud Security. The Virtualization Practice Sponsored by Trend Micro [4] Virtualization Security and Best Practices Rob Randell, CISSP [5] Virtualization and Risk: Key Security Considerations for Your Enterprise Architecture, McAffe [6] NIST Guide to Intrusion Detection and Prevention Systems, http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf [7] Gartner, Radically Transforming Security and Management in a Virtualized World: Concepts, Neil MacDonald, March 14, 2008 [8] VM World News, www.vmware.com/vmworldnews/esx.html [9] Top Virtualization Security Mistakes(and How to Avoid Them) A SANS Whitepaper – August 2009 , Written by Jim D. Hietala [10] Secure In-VM Monitoring Using Hardware Virtualization, Institute Eurecom, Sophia Antipolis, France. [11] http://www.ibm.com/developerworks/cloud/library
Paper ID: GRDJEV01I120016
Published in: Volume : 1, Issue : 12
Publication Date: 2016-12-01
Page(s): 20 - 24