Return to search

Impact of DDoS Attack on the Three Common HypervisorS(Xen, KVM, Virtual Box)

Cloud computing is a technology of inter-connected servers and resources that use virtualization to utilize the resources, flexibility, and scalability. Cloud computing is accessible through the network. This accessibility and utilization have its own benefit and drawbacks. Utilization and scalability make this technology more economic and affordable for even small businesses. Flexibility drastically reduces the risk of starting businesses. Accessibility allows cloud customers not to be restricted in a specific location until they could have access to the network, and in most cases through the internet.
These significant traits, however, have their own disadvantages. Easy accessibility makes it more convenient for the malicious user to have access to servers in the cloud. Virtualizations that come to existence by middleware software called Virtual Machine Managers (VMMs) or hypervisors come with different vulnerabilities. These vulnerabilities are adding to previously existed vulnerability of Networks and Operating systems and Applications. In this research we are trying to distinguish the most resistant Hypervisor between (Xen, KVM and Virtual Box) against Distributed Denial of Service (DDoS) attack, an attempt to saturate victim’s resources making them unavailable to legitimate users, or shutting down the services by using more than one machine as attackers by targeting three different resources (Network, CPU, Memory). This research will show how hypervisors act differently under the same attacks and conditions.

Identiferoai:union.ndltd.org:WKU/oai:digitalcommons.wku.edu:theses-2649
Date01 July 2016
CreatorsSheinidashtegol, Pezhman
PublisherTopSCHOLAR®
Source SetsWestern Kentucky University Theses
Detected LanguageEnglish
Typetext
SourceMasters Theses & Specialist Projects

Page generated in 0.0013 seconds