preview

Virtual Machine Intrusions

Decent Essays

The technique can detect DDoS attacks as well and blocking complete botnets (Amna Riaz 2017). However, NIDS is going to face issues processing all packets in large virtual network and it may fail to detect attacks in time as SNORT is single threaded.

Another solution that has been studied is Virtual Machine Introspection (VMI) based technique (Amna Riaz 2017). Virtual machine introspection (VMI) is the main idea behind out-of-box intrusion detection. VMI is a technique of inspecting VM state by moving the inspection module outside of the VM. The software running inside the guest system is analysed externally to detect any intrusion. One advantage of this technique is that malware detection continues to work unaffectedly even in the …show more content…

However, on the brighter side a NIDS has high attack resistance ().

Being SNORT as a single threaded, processing huge logs for the cloud computing is an issue so multi thread IDS is essential in the cloud computing (Parag K. Shelke 2012, p. 68). SURICATA is multi-threaded and could resolve the performance issues and packet loss we face with the single thread IDS.

Virtualization has made network management more challenging, and it’s more and more difficult to consistently apply firewall and content filtering policies. When you add in complexities such as securing BYOD devices, the security problem is intensified. Software-defined networking (SDN) is next evolving technology for the cloud computing. SDN is an umbrella term covering several kinds of network technology aimed at making the network as agile and flexible as the virtualized server and storage infrastructure of the modern data center. The SDN Controller provides a centralized system to manage the network. The network administrators are empowered by SDN to easily access and manage individual flows by facilitating them to implement monitoring applications, i.e., firewall and IDS. Furthermore, scalable monitoring and dynamic reconfiguration requirements of the network in cloud makes SDN a perfect choice (Amna Riaz 2017).
Using OSSEC and BRO as IDS tools can also help to resolve analysing and integrating the log files as OSSEC has a powerful

Get Access