📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 4, ISSUE 11, NOVEMBER 2015

Hiding Virtualization from Attacks

Navaneetha M, Dr. M. Shiva Kumar

DOI: 10.17148/IJARCCE.2015.41104

Abstract: This paper presents a new concept of security assessment methodology for the hiding of virtualization from the attacks and several areas of its application. Virtual machine environments (VMEs) let a user or administrator sprint one or more guest operating systems on top of a host operating system�for example, three or four instances of the Microsoft Windows operating system could run as caller systems on a Linux host operating system on a single PC or server. Such environments are widely used as patrons or servers in a diversity of commercial, administration, and martial organizations. Beyond normal business operations, security researchers and honey pot technologies often leverage VMEs to analyse malicious code discovered in the feral to determine its functionality, business model, origin, and author. Because VMEs offer useful monitoring and isolation capabilities, malware researchers are increasingly reliant on these products to conduct their trade.



Keywords: Include at least 4 keywords or phrases.

How to Cite:

[1] Navaneetha M, Dr. M. Shiva Kumar, “Hiding Virtualization from Attacks,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2015.41104