DocumentCode :
1670838
Title :
Virtualized hosting: Devising a security policy through log analysis
Author :
Guster, Dennis C. ; Lee, Olivia F. ; Rogers, Dustin C.
Author_Institution :
Dept. of Inf. Syst., St. Cloud State Univ., St. Cloud, MN, USA
fYear :
2011
Firstpage :
25
Lastpage :
29
Abstract :
The paper provides an overview of three common virtualization threats that have been observed in log files in the authors´ network and suggests solutions to mitigate those security vulnerabilities. The solutions offered have been implemented on a network with over 200 hosts 40 of which are virtualized.
Keywords :
security of data; virtualisation; log analysis; security policy; security vulnerability; virtualization threat; virtualized hosting; Computers; Hardware; Monitoring; Random access memory; Security; Virtual machining; Wide area networks; Virtualization; log disaster recovery; security policy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Applications of Digital Information and Web Technologies (ICADIWT), 2011 Fourth International Conference on the
Conference_Location :
Stevens Point, WI
Print_ISBN :
978-1-4244-9824-6
Type :
conf
DOI :
10.1109/ICADIWT.2011.6041399
Filename :
6041399
Link To Document :
بازگشت