Hypervisor Attack Detection Using Advanced Encryption Standard (HADAES) Algorithm on Cloud Data

Q4 Computer Science
R. Mangalagowri, R. Venkataraman
{"title":"Hypervisor Attack Detection Using Advanced Encryption Standard (HADAES) Algorithm on Cloud Data","authors":"R. Mangalagowri, R. Venkataraman","doi":"10.22247/ijcna/2022/215916","DOIUrl":null,"url":null,"abstract":"– Cloud computing demonstrates excellent power to yield cost-efficient, easily manageable, flexible, and charged resources whenever required, over the Internet. Cloud computing, can make the potential of the hardware resources to increase huge through best and shared usage. The growth of the cloud computing concept has also resulted in security challenges, considering that there are resource sharing, and it is moderated with the help of a Hypervisor which can be the target of malicious guest Virtual Machines (VM) and remote intruders. The hypervisor itself is attacked by hackers. Since the hypervisor is attacked, the VMs under the hypervisor is also attacked by the attackers. Hence, to prevent the problems stated above, in this study, Enhanced Particle Swarm Optimization (EPSO) with Hypervisor Attack Detection using Advanced Encryption Standard (HADAES) algorithm is introduced with the intent of improving the cloud performance on the whole. This work contains important phases such as system model, optimal resource allocation, and hypervisor attack detection. The system model contains the data center model, migration request model, and energy model over the cloud computing environment. Resource allocation is done by using the EPSO algorithm which is used to select the optimal resources using local and global best values. Hypervisor attack detection is done by using HADAES algorithm. It is helpful to determine the hypervisor and VM attackers also it is focused to provide higher security for cloud data. From the test result, it is concluded that the proposed algorithm yields superior performance concerning improved reliability, throughput, and reduced energy consumption, cost complexity, and time complexity than the existing methods. The effectiveness of IDS depends on its capacity to strike a balance between the number of defenses and the number of false positives or detecting errors. algorithm. The best and the mean costs of the population members and the execution time when applying the EPSO method. In this study, an innovative time-adaptive PSO is proposed based on the movement patterns named the movement pattern adaptation PSO (EPSO).","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Networks and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22247/ijcna/2022/215916","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

– Cloud computing demonstrates excellent power to yield cost-efficient, easily manageable, flexible, and charged resources whenever required, over the Internet. Cloud computing, can make the potential of the hardware resources to increase huge through best and shared usage. The growth of the cloud computing concept has also resulted in security challenges, considering that there are resource sharing, and it is moderated with the help of a Hypervisor which can be the target of malicious guest Virtual Machines (VM) and remote intruders. The hypervisor itself is attacked by hackers. Since the hypervisor is attacked, the VMs under the hypervisor is also attacked by the attackers. Hence, to prevent the problems stated above, in this study, Enhanced Particle Swarm Optimization (EPSO) with Hypervisor Attack Detection using Advanced Encryption Standard (HADAES) algorithm is introduced with the intent of improving the cloud performance on the whole. This work contains important phases such as system model, optimal resource allocation, and hypervisor attack detection. The system model contains the data center model, migration request model, and energy model over the cloud computing environment. Resource allocation is done by using the EPSO algorithm which is used to select the optimal resources using local and global best values. Hypervisor attack detection is done by using HADAES algorithm. It is helpful to determine the hypervisor and VM attackers also it is focused to provide higher security for cloud data. From the test result, it is concluded that the proposed algorithm yields superior performance concerning improved reliability, throughput, and reduced energy consumption, cost complexity, and time complexity than the existing methods. The effectiveness of IDS depends on its capacity to strike a balance between the number of defenses and the number of false positives or detecting errors. algorithm. The best and the mean costs of the population members and the execution time when applying the EPSO method. In this study, an innovative time-adaptive PSO is proposed based on the movement patterns named the movement pattern adaptation PSO (EPSO).
基于HADAES (Advanced Encryption Standard)算法的云数据虚拟化环境攻击检测
云计算展示了出色的能力,可以在任何需要的时候通过互联网产生成本效益高、易于管理、灵活且收费的资源。云计算,可以使硬件资源的潜力通过最佳和共享的使用得到极大的提高。云计算概念的发展也带来了安全挑战,考虑到存在资源共享,并且在管理程序的帮助下进行调节,管理程序可能成为恶意来宾虚拟机(VM)和远程入侵者的目标。管理程序本身受到黑客的攻击。由于虚拟化环境受到攻击,虚拟化环境下的虚拟机也会受到攻击。因此,为了防止上述问题,在本研究中,引入了使用高级加密标准(HADAES)算法进行Hypervisor攻击检测的增强型粒子群优化(EPSO),旨在从整体上提高云性能。这项工作包括系统建模、最优资源分配和hypervisor攻击检测等重要阶段。系统模型包括云计算环境下的数据中心模型、迁移请求模型和能源模型。资源分配采用EPSO算法,利用局部和全局最优值选择最优资源。Hypervisor攻击检测采用HADAES算法。它有助于确定虚拟机管理程序和虚拟机攻击者,并致力于为云数据提供更高的安全性。测试结果表明,该算法在提高可靠性、吞吐量、降低能耗、成本复杂度和时间复杂度等方面优于现有算法。IDS的有效性取决于其在防御数量与误报或检测错误数量之间取得平衡的能力。算法。应用EPSO方法计算了种群成员的最佳成本和平均成本以及执行时间。本文提出了一种基于运动模式的时间自适应粒子群算法,称为运动模式自适应粒子群算法(EPSO)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
International Journal of Computer Networks and Applications
International Journal of Computer Networks and Applications Computer Science-Computer Science Applications
CiteScore
2.30
自引率
0.00%
发文量
40
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信