No Cover Image

Journal article 197 views

Network and Hypervisor-Based Attacks in Cloud Computing Environments

Alireza Daneshkhah, Amin Hosseinian Far, Fiona Carroll, Reza Montasari Orcid Logo, Stuart Macdonald Orcid Logo

International Journal of Electronic Security and Digital Forensics, Volume: 13, Issue: 6

Swansea University Authors: Reza Montasari Orcid Logo, Stuart Macdonald Orcid Logo

  • Accepted Manuscript under embargo until: 28th October 2022

Abstract

Cloud Computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to it...

Full description

Published in: International Journal of Electronic Security and Digital Forensics
ISSN: 1751-911X 1751-9128
Published: Inderscience Publishers 2021
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa55398
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2020-10-12T09:19:11Z
last_indexed 2021-11-17T04:20:53Z
id cronfa55398
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2021-11-16T11:55:42.3105065</datestamp><bib-version>v2</bib-version><id>55398</id><entry>2020-10-12</entry><title>Network and Hypervisor-Based Attacks in Cloud Computing Environments</title><swanseaauthors><author><sid>e420369ac98aaaa7f39248e39a847af1</sid><ORCID>0000-0001-7136-6753</ORCID><firstname>Reza</firstname><surname>Montasari</surname><name>Reza Montasari</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2020-10-12</date><deptcode>CSSP</deptcode><abstract>Cloud Computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to its rapid adoption by businesses and governments worldwide. Despite the many technological and economic benefits that CC offers, at the same time, it poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. Therefore, to create a practical understanding of such threats, this paper provides an analysis of common and underexplored network- and hypervisor-based attacks against CC systems from a technical viewpoint.</abstract><type>Journal Article</type><journal>International Journal of Electronic Security and Digital Forensics</journal><volume>13</volume><journalNumber>6</journalNumber><paginationStart/><paginationEnd/><publisher>Inderscience Publishers</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>1751-911X</issnPrint><issnElectronic>1751-9128</issnElectronic><keywords/><publishedDay>28</publishedDay><publishedMonth>10</publishedMonth><publishedYear>2021</publishedYear><publishedDate>2021-10-28</publishedDate><doi>10.1504/ijesdf.2021.10036493</doi><url/><notes/><college>COLLEGE NANME</college><department>Criminology, Sociology and Social Policy</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>CSSP</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2021-11-16T11:55:42.3105065</lastEdited><Created>2020-10-12T10:15:57.2169832</Created><path><level id="1">College of Law</level><level id="2">Law</level></path><authors><author><firstname>Alireza</firstname><surname>Daneshkhah</surname><order>1</order></author><author><firstname>Amin Hosseinian</firstname><surname>Far</surname><order>2</order></author><author><firstname>Fiona</firstname><surname>Carroll</surname><order>3</order></author><author><firstname>Reza</firstname><surname>Montasari</surname><orcid>0000-0001-7136-6753</orcid><order>4</order></author><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>5</order></author></authors><documents><document><filename>Under embargo</filename><originalFilename>Under embargo</originalFilename><uploaded>2020-10-12T10:18:23.1642588</uploaded><type>Output</type><contentLength>753357</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><embargoDate>2022-10-28T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807>
spelling 2021-11-16T11:55:42.3105065 v2 55398 2020-10-12 Network and Hypervisor-Based Attacks in Cloud Computing Environments e420369ac98aaaa7f39248e39a847af1 0000-0001-7136-6753 Reza Montasari Reza Montasari true false 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2020-10-12 CSSP Cloud Computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to its rapid adoption by businesses and governments worldwide. Despite the many technological and economic benefits that CC offers, at the same time, it poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. Therefore, to create a practical understanding of such threats, this paper provides an analysis of common and underexplored network- and hypervisor-based attacks against CC systems from a technical viewpoint. Journal Article International Journal of Electronic Security and Digital Forensics 13 6 Inderscience Publishers 1751-911X 1751-9128 28 10 2021 2021-10-28 10.1504/ijesdf.2021.10036493 COLLEGE NANME Criminology, Sociology and Social Policy COLLEGE CODE CSSP Swansea University 2021-11-16T11:55:42.3105065 2020-10-12T10:15:57.2169832 College of Law Law Alireza Daneshkhah 1 Amin Hosseinian Far 2 Fiona Carroll 3 Reza Montasari 0000-0001-7136-6753 4 Stuart Macdonald 0000-0002-7483-9023 5 Under embargo Under embargo 2020-10-12T10:18:23.1642588 Output 753357 application/pdf Accepted Manuscript true 2022-10-28T00:00:00.0000000 true eng
title Network and Hypervisor-Based Attacks in Cloud Computing Environments
spellingShingle Network and Hypervisor-Based Attacks in Cloud Computing Environments
Reza, Montasari
Stuart, Macdonald
title_short Network and Hypervisor-Based Attacks in Cloud Computing Environments
title_full Network and Hypervisor-Based Attacks in Cloud Computing Environments
title_fullStr Network and Hypervisor-Based Attacks in Cloud Computing Environments
title_full_unstemmed Network and Hypervisor-Based Attacks in Cloud Computing Environments
title_sort Network and Hypervisor-Based Attacks in Cloud Computing Environments
author_id_str_mv e420369ac98aaaa7f39248e39a847af1
933e714a4cc37c3ac12d4edc277f8f98
author_id_fullname_str_mv e420369ac98aaaa7f39248e39a847af1_***_Reza, Montasari_***_0000-0001-7136-6753
933e714a4cc37c3ac12d4edc277f8f98_***_Stuart, Macdonald_***_0000-0002-7483-9023
author Reza, Montasari
Stuart, Macdonald
author2 Alireza Daneshkhah
Amin Hosseinian Far
Fiona Carroll
Reza Montasari
Stuart Macdonald
format Journal article
container_title International Journal of Electronic Security and Digital Forensics
container_volume 13
container_issue 6
publishDate 2021
institution Swansea University
issn 1751-911X
1751-9128
doi_str_mv 10.1504/ijesdf.2021.10036493
publisher Inderscience Publishers
college_str College of Law
hierarchytype
hierarchy_top_id collegeoflaw
hierarchy_top_title College of Law
hierarchy_parent_id collegeoflaw
hierarchy_parent_title College of Law
department_str Law{{{_:::_}}}College of Law{{{_:::_}}}Law
document_store_str 0
active_str 0
description Cloud Computing (CC) has become one of the most transformative computing technologies and a key business avenue, following in the footsteps of main-frames, minicomputers, personal computers, the World Wide Web and smartphones. Its vital features have considerably reduced IT costs, contributing to its rapid adoption by businesses and governments worldwide. Despite the many technological and economic benefits that CC offers, at the same time, it poses complex security threats resulting from the use of virtualisation technology. Compromising the security of any component in the cloud virtual infrastructure will negatively affect the security of other elements and so impact the overall system security. Therefore, to create a practical understanding of such threats, this paper provides an analysis of common and underexplored network- and hypervisor-based attacks against CC systems from a technical viewpoint.
published_date 2021-10-28T04:23:17Z
_version_ 1723080268375392256
score 10.853036