Acta Scientific Computer Sciences (ASCS)

Research Article Volume 2 Issue 2

A Survey Paper on Hypervisor-Based Cloud Intrusion Detection System (IDS)

Imran Mahmood*

IQRA University, Pakistan

*Corresponding Author: Imran Mahmood, IQRA University, Pakistan.

Received: January 04, 2020; Published: January 31, 2020



  Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. In cloud computing, the word cloud (also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services such as servers, storage and applications, are delivered to an organization's computers and devices through the Internet.

  Cloud computing has many common characteristics with distributed systems like use of networking and sharing. Thus security is the biggest issue. Cloud computing intrusion detection is an active research area. A cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. An IDS is a system that will analyze all the traffic on the network. They will compare them against their database, and decide whether or not it's an attack, in order to alert an administrator, or an IPS, to stop the intrusion.

   In the cloud environment Hypervisor and Virtual Machine are more significant for protecting valuable data from attackers. A hypervisor or virtual machine monitor (VMM) is computer software, firmware or hardware that creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is called a host machine, and each virtual machine is called a guest machine. Cloud providers use the virtualization technology to share the sources, which is available in two levels including virtual machine and hypervisor. In the infrastructure, the cloud virtual machines are shared with other organizations virtual machines as the service. It is tried to use the virtualization properties in the hypervisor level and improve the IDS in the infrastructure layer of cloud computing.

Keywords: Hypervisor; Intrusion Detection System



  1. "Google Apps for Work – Gmail, Drive, Docs and More," 
  2. "Google apps engine," 
  3. "Azure services platform," 
  4. "Amazon web services," 
  5. "Eucalyptus," 
  6. Opennebula. 
  7. P Mell and T Grance. "The NIST Definition of Cloud Computing (Draft),".
  8. S Bahram., et al. “DKSM: Subverting Virtual Machine Introspection for Fun and Profit”. In Reliable Distributed Systems, 2010 29th IEEE Symposium on (2010): 82-91. 
  9. ST King., et al. “SubVirt- Implementing malware with virtual machines”. IEEE Symposium on Security and Privacy (2006): 314-327.
  10. J Rutkowska. “Subverting Vista TM kernel for fun and profit”. In Black Hat Conference (2006).
  11. A Patel., et al. “An intrusion detection and prevention system in cloud computing: A systematic review”. Journal of Network and Computer Applications 36.1 (2013): 25-41. 
  12. M Zbakh., et al. “A multi-criteria analysis of intrusion detection architectures in cloud environments”. Cloud Technologies and Applications (Cloud Tech) International Conference on (2015): 1-9. 
  13. C Modi., et al. “A survey of intrusion detection techniques in Cloud”. Journal of Network and Computer Applications 36.1 (2013): 42-57.
  14. Payne BD., et al. “Secure and Flexible Monitoring of Virtual Machines”. In: Proceedings of 23rd Annual Computer Security Applications Conference, ACSAC, Miami Beach (Florida), USA  (2007): 385-397.
  15. Rajagopalan M., et al. “System Call Monitoring Using Authenticated System Calls”. IEEE Transactions on Dependable and Secure Computing 3.3 (2006): 216-229.
  16. Khanna R and Liu H. “Control Theoretic Approach to Intrusion Detection Using a Distributed Hidden Markov Model”. IEEE Wireless Communications 15.8 (2008): 24-33.
  17. Bessani A., et al. “Cheap Intrusion-Tolerant Protection for Crutial Things”. Technical Report (2009).


Citation: Imran Mahmood. “A Survey Paper on Hypervisor-Based Cloud Intrusion Detection System (IDS)”. Acta Scientific Computer Sciences 2.2 (2020): 23-28.


Acceptance rate35%
Acceptance to publication20-30 days

Indexed In

News and Events

  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is May 30, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US