Imran Mahmood*
IQRA University, Pakistan
*Corresponding Author: Imran Mahmood, IQRA University, Pakistan.
Received: January 04, 2020; Published: January 31, 2020
Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. In cloud computing, the word cloud (also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services such as servers, storage and applications, are delivered to an organization's computers and devices through the Internet.
Cloud computing has many common characteristics with distributed systems like use of networking and sharing. Thus security is the biggest issue. Cloud computing intrusion detection is an active research area. A cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. An IDS is a system that will analyze all the traffic on the network. They will compare them against their database, and decide whether or not it's an attack, in order to alert an administrator, or an IPS, to stop the intrusion.
In the cloud environment Hypervisor and Virtual Machine are more significant for protecting valuable data from attackers. A hypervisor or virtual machine monitor (VMM) is computer software, firmware or hardware that creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is called a host machine, and each virtual machine is called a guest machine. Cloud providers use the virtualization technology to share the sources, which is available in two levels including virtual machine and hypervisor. In the infrastructure, the cloud virtual machines are shared with other organizations virtual machines as the service. It is tried to use the virtualization properties in the hypervisor level and improve the IDS in the infrastructure layer of cloud computing.
Keywords: Hypervisor; Intrusion Detection System
Citation: Imran Mahmood. “A Survey Paper on Hypervisor-Based Cloud Intrusion Detection System (IDS)”. Acta Scientific Computer Sciences 2.2 (2020): 23-28.
Copyright: © 2020 Imran Mahmood. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.