Types of Attacks and Security Methods. Virtual Machines
Downloads
Virtualization is a type of process used to create a virtual environment. Many organizations think about the security implications after implementing a new technology. Virtualization can be used in many ways and requires appropriate security controls in each situation. This paper presents the idea of using a virtual machine to share services and information over the Internet. In case of an attack, the resources of the virtual machine will be affected, while the resources of the real machine are safe. In this paper, we present the perspective of an attack by running malicious software on a virtual machine. We will show that although unauthorized control of the virtual machine is obtained, the real machine is not affected.
Downloads
Bernaschi, M., Grabrielli, E., Mancini, L. (2000) “Operating System Enhancements to Prevent the Misuse of System Calls”, Proceedings of the ACM Conference on Computer and Communications Security.
Bernaschi, M., Grabrielli, E., Mancini, L. (2002) “REMUS: A Security-Enhanced Operating System”,ACM Transactions on Information and System Security, Vol 5, 2001,
Blunden, B. (2002) “Virtual Machine Design and Implementation in C/C++”, Wordware Publ. Plano,Texas – USA.
Chen, P., Noble, B. (2001) “When Virtual Is Better Than Real”, Proceedings of the 2001 Workshop on Hot Topics in Operating Systems (HotOS).
Goldberg, R. (1973) “Architecture of Virtual Machines”, AFIPS National Computer Conference. New York – NY– USA.
Oliphant,P., "Virtual Machines". Virtual Computing. Archived from the original on 2016-07-29. Retrieved 2015-09-23.
Randika, Y., “Virtual Machines”, Feb 28, 2021, https://yasirurandika.medium.com/virtual-machines-937c99156ca5.
Sugerman, J., Ganesh, V., Beng-Hong L. (2001). Virtualizing I/O Devices on VMware Workstation’s Hosted Virtual Machine Monitor. Proceedings of the 2001 USENIX Annual Technical Conference.
VMware Inc. (1999) “VMware Technical White Paper”, Palo Alto – CA - USA.
Vmware Emulator. http://www.vmware.com.
https://www.fortinet.com/resources/cyberglossary/types-of-cyber-attacks
https://www.proofpoint.com/us/threat-reference/email-spoofing