IJISC
  • Indexed in

  • Latest News

    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Penetration Tests on Virtual Environment


    Author(s): MIHAI, Ioan-Cosmin

    Quick view | Full article | Citations | Views: 2,034


    Author(s) keywords: , ,


    Reference keywords: , ,


    Abstract:

    In the battle for on-line information both attackers and defenders of computer systems try to gain complete control over the system. To maximize their control, they have migrated to low-level, operating system code. In this conditions we present the idea of using a virtual machine to share services and information over the Internet. In case of an attack the virtual machine resources will be affected while the real machine resources will be safe.



    References:

    [1]. Barham P., Dragovic B., Fraser K., Hand S., Harris T.,Ho A., Neugebauer R., Pratt I., Warfield A. (2003) “Xenand the Art of Virtualization”, 19th ACM Symposium on Operating Systems Principles – SOSP 2003.

    [2]. Bernaschi, M., Grabrielli, E., Mancini, L. (2000) “Operating System Enhancements to Prevent the Misuse of System Calls”, Proceedings of the ACM Conference on Computer and Communications Security.

    [3]. Bernaschi, M., Grabrielli, E., Mancini, L. (2002) “REMUS: A Security-Enhanced Operating System”,ACM Transactions on Information and System Security, Vol 5, 2001.

    [4]. Blunden, B. (2002) “Virtual Machine Design and Implementation in C/C++”, Wordware Publ. Plano,Texas – USA.

    [5]. Chen, P., Noble, B. (2001) “When Virtual Is Better Than Real”, Proceedings of the 2001 Workshop on Hot Topics in Operating Systems (HotOS).

    [6]. Dike, J. (2000) “A User-mode port of the Linux Kernel”, Proceedings of the 4th Annual Linux Showcase &Conference. Atlanta – USA.

    [7]. Dunlap, G., King, S., Cinar, S., Basrai, M., Chen, P. (2002) “ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay”, Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI).

    [8]. Garfinkel, T., Rosenblum, M. (2003) “A Virtual Machine Introspection Based Architecture for Intrusion Detection”, Proceedings of the Network and Distributed System Security Symposium (NDSS).

    [9]. Goldberg, R. (2001) “Architecture of Virtual Machines”, AFIPS National Computer Conference. New York – NY– USA.

    [10]. King, S., Chen, P. (2002) “Operating System Extensions to Support Host Based Virtual Machines”, Technical Report CSE-TR-465-02, University of Michigan.

    [11]. King, S., Dunlap, G., Chen, P. (2003) “Operating System Support for Virtual Machines”, Proceedings of the 2003 USENIX Technical Conference.

    [12]. Sugerman, J., Ganesh, V., Beng-Hong L. (2001). Virtualizing I/O Devices on VMware Workstation’s Hosted Virtual Machine Monitor. Proceedings of the 2001 USENIX Annual Technical Conference.

    [13]. VMware Inc. (1999) “VMware Technical White Paper”, Palo Alto – CA - USA.

    [14]. Whitaker, A., Shaw, M. e Gribble, S. (2002) “Denali: A Scalable Isolation Kernel”, Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion – France.

    [15]. Vmware Emulator. http://www.vmware.com, accessed on May 2011



    Additional Information

    Article Title: Penetration Tests on Virtual Environment
    Author(s): MIHAI, Ioan-Cosmin
    Date of Publication: 2012-06-21
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2012.01.04
    Issue: Volume 1, Issue 1, Year 2012
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 37-45 (9 pages)



    Copyright ©2012-2025
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.