Vulnerability Assessment for Virtual Machines in Virtual Environment of Cloud Computing

被引:0
|
作者
Patil, Rajendra [1 ]
Modi, Chirag [1 ]
机构
[1] Natl Inst Technol Goa, Dept Comp Sci & Engn, Farmagudi 403401, Ponda, India
关键词
Cloud computing; Virtualization; Virtual machines; Vulnerability assessment; Security;
D O I
10.1007/978-981-10-8639-7_60
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we design an automated framework for vulnerability assessment of virtual machines in cloud computing. It uses multithread model to scan newly joined VMs for potential vulnerabilities. We define ranking score to find the critical vulnerabilities based on impact score, exploitability score, and risk score. All the scanned vulnerabilities are analyzed for ranking score and the critical vulnerabilities are sent to the patching system.
引用
收藏
页码:569 / 576
页数:8
相关论文
共 50 条
  • [41] Using Processing Features for Allocation of Virtual Machines in Cloud Computing
    Rego, P. A. L.
    Coutinho, E. F.
    Lima, A. S.
    de Souza, J. N.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (08) : 2798 - 2812
  • [42] Virtual Machines Allocation and Migration Mechanism in Green Cloud Computing
    Bouchareb, Nassima
    Zarour, Nacer Eddine
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, 2019, 64 : 16 - 33
  • [43] The Optimal Resource Allocation Among Virtual Machines in Cloud Computing
    Gusev, Marjan
    Ristov, Sasko
    THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION (CLOUD COMPUTING 2012), 2012, : 36 - 42
  • [44] Clustering based virtual machines placement in distributed cloud computing
    Zhang, Jiangtao
    Wang, Xuan
    Huang, Hejiao
    Chen, Shi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 66 : 1 - 10
  • [45] Security analysis in the dynamic migration of virtual machines in cloud computing
    Shang, Huihua (Shanghuihua@163.com), 2017, Universidad Central de Venezuela (55):
  • [46] Cloud Computing: Insider Attacks on Virtual Machines During Migration
    Duncan, Adrian
    Creese, Sadie
    Goldsmith, Michael
    Quinton, Jamie S.
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 493 - 500
  • [47] Configuration and Optimization of Virtual Business in Cloud Computing Environment
    Sun, Hongjun
    Huang, Shuangxi
    Fan, Yushun
    Su, Wei
    SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 39 - 46
  • [48] Optimization of Virtual Resources Allocation in Cloud Computing Environment
    Akintoye, Samson B.
    Bagula, Antoine
    2017 IEEE AFRICON, 2017, : 873 - 880
  • [49] Application of Trusted Virtual Environment Module in Cloud Computing
    Hu Yu
    SUSTAINABLE DEVELOPMENT OF NATURAL RESOURCES, PTS 1-3, 2013, 616-618 : 2196 - 2199
  • [50] Cloud Task and Virtual Machine Allocation Strategy in Cloud Computing Environment
    Xu, Xing
    Hu, Hao
    Hu, Na
    Ying, Weiqin
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 113 - 120