Hypervisor Based Intruder Detection in Cloud Environment


  • Tarun A.Saluja Information Technology, PG Scholar, G.H.Patel College of Engineering
  • Jay Vala Information Technology, Assistant Professor, G.H.Patel College of Engineering
  • Bhargesh Patel Information Technology, Assistant Professor, G.H.Patel College of Engineering


- Cloud computing, Networking, Types of attack


Cloud computing is becoming much popular due to many of its advantages like high
performance, distributed computing, high security, pay per use modules etc. . . . Cloud is evolved
from simple networking applications. Grid/Cluster/Utility Computing helped formation of basic
infrastructure as a service concept. Distributed concurrent and parallel processing with service
oriented architecture set a platform for virtualization of resources, making cloud computing possible.
The cloud computing model has the ability to scale computer resources on demand, and give users a
number of advantages to progress their conventional cluster system. In addition, there is no upfront
investment to update infrastructure, labour and no ongoing expenses.
Virtualization, which allows multiple Virtual Machines (VMs) to reside on a single physical
machine, has become an indispensable technology for today’s IT infrastructure. It is known that the
overhead for virtualization affects system performance; yet it remains largely unknown whether VMs
are more vulnerable to networked Denial of Service (DoS) attacks than conventional physical
machines. A clear understanding here is obviously critical to such networked virtualization system as
cloud computing platforms.
The problem we see is recurrence of the same mistakes that were made with the development of the
internet. These mistakes were related to functionality and performance which took precedence over



How to Cite

Tarun A.Saluja, Jay Vala, & Bhargesh Patel. (2014). Hypervisor Based Intruder Detection in Cloud Environment. International Journal of Advance Engineering and Research Development (IJAERD), 1(6), 353–359. Retrieved from http://ijaerd.com/index.php/IJAERD/article/view/238