Abstract
Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for security attackers who want to gain access into the virtualization environment. InVM
monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other virtualization security techniques.
monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other virtualization security techniques.
Original language | English |
---|---|
Title of host publication | SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks |
Place of Publication | New York |
Publisher | Association for Computing Machinery (ACM) |
Pages | 405-410 |
Number of pages | 6 |
ISBN (Print) | 9781450330336 |
DOIs | |
Publication status | Published - Sep 2014 |
Keywords
- virtual machine introspection
- virtualization security
- virtualization
- cloud computing