Survey on Different Methods for Attacking Virtual Machine

Radha Korimani, Geetha S, Mahesh Kaluti

Abstract: One of the benefits of IaaS to the shopper is that the rapid property of their provision. This property can would like relocation of a VM from one physical machine and / or one hyper-visor to a different. Whereas such migration is obvious and likely seamless, it's about to in addition introduce vulnerability. We explore here the potential for a malicious user to exploit vulnerabilities associated with mobile VMs to urge huge volumes of cloud-user information. In this paper ,we are presenting totally different attacks on virtual machines throughout migration that don't seem to be detectable.

Keywords: VM, sniffer.

Title: Survey on Different Methods for Attacking Virtual Machine

Author: Radha Korimani, Geetha S, Mahesh Kaluti

International Journal of Computer Science and Information Technology Research

ISSN 2348-1196 (print), ISSN 2348-120X (online)

Research Publish Journals

Vol. 3, Issue 2, April 2015 - June 2015

Citation
Share : Facebook Twitter Linked In

Citation
Survey on Different Methods for Attacking Virtual Machine by Radha Korimani, Geetha S, Mahesh Kaluti