Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/6673
Title: | Development of Cloud Monitoring System Handling IaaS Level Attacks |
Authors: | Oza, Parth |
Keywords: | Computer 2014 Project Report 2014 Computer Project Report Project Report 14MCEI 14MCEI11 INS INS 2014 CE (INS) |
Issue Date: | 1-Jun-2016 |
Publisher: | Institute of Technology |
Series/Report no.: | 14MCEI11; |
Abstract: | In the past recent years, the cloud computing has been introduced as a very effective environment for parallel computation using virtualization, data storage etc. Since the users provide their confidential data to the cloud service providers, it has become a big challenge for cloud service providers to provide security to the user’s data against data breaches, denial of service, data loss, abuse of cloud services, root privilege escalation from guest os etc. Virtualization is the key component that endows the cloud technology. Hypervisor is the component that provides the virtualization which allows the virtual machines to have the access of physical hardware like memory and processors. If an attacker somehow manages to compromise the hypervisor, he can get the access of host operating system as well as other virtual instances running on that hypervisor. Another Network Layer based attack like spoofing and/or poison attacks on the Virtual machines of cloud system can cause the downturn of the cloud system. In this thesis, we have developed a cloud monitoring system which primarily focuses on the hypervisor based attacks as well as the Spoofing and Poison attacks. Many attacks have been identified on very popular and easily available open-source hypervisor, Kernel Based Virtual Machine (KVM) and XEN. Vulnerabilities reside at the code-based implementation of these hyperviors. It is possible for someone possessing very basic knowledge of computer networks to perform spoofing or poisoning attacks. Many researchers have proposed their solutions to these kinds of attacks, but they are not scalable to apply to the large scale networks and can detect a very limited cases of the attack. This thesis aims to provide a reliable solution to these problems by maintaining a ip-mac-unique id pair for each system in the cloud and by providing SR-IOV support to the cloud infrastructure. Once the attacker system is detected, we try to prevent the access of cloud from the attacker system. |
URI: | http://hdl.handle.net/123456789/6673 |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
14MCEI11.pdf | 14MCEI11 | 13.62 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.