• Login
    View Item 
    •   Shocker Open Access Repository Home
    • Graduate Student Research
    • ETD: Electronic Theses and Dissertations
    • Master's Theses
    • View Item
    •   Shocker Open Access Repository Home
    • Graduate Student Research
    • ETD: Electronic Theses and Dissertations
    • Master's Theses
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Threat modeling of para-virtualized environments

    View/Open
    t11111_Nagaraj.pdf (961.4Kb)
    Date
    2011-12
    Author
    Nagaraj, Rajeev
    Advisor
    Pendse, Ravi
    Metadata
    Show full item record
    Abstract
    Organizations are looking at various cost effective methods to reduce the overall cost of data storage systems. This measure is taken essentially to reduce the hardware that is currently being used for hosting servers. In recent years, the organizations around the world have looked at various options such as parallel computing and grid computing. However, these techniques have not been implemented in organizations due to their limitations. Virtualization is a new technique that is being adopted by system administrators to overcome the hardware issues within a computer network. Virtualization has the main advantages such as secure logging and terra architecture which enhances overall performance of the server and effectively reduces the cost. Virtualization can be broadly classified into 2 types: Full Virtualization and Para-Virtualization. As, with every new technology that comes into existence, there arise the security concerns associated with it. This thesis addresses the growing security concerns associated with Virtual Machines (VM's) in a Para-virtualized environment. Some of the most common threats are Denial of Resource Attack, Sniffing Attack, and Authentication and Authorization issues. Thus, it becomes essential to derive a threat model so that these issues are identified based on their severities and addressed more effectively with appropriate security algorithms. This thesis provides the readers an insight to modeling threats, analyzing threat parameters, deriving risk equations, and validating the results.
    Description
    Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering.
    URI
    http://hdl.handle.net/10057/5192
    Collections
    • CE Theses and Dissertations
    • EECS Theses and Dissertations
    • Master's Theses

    Browse

    All of Shocker Open Access RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace software copyright © 2002-2023  DuraSpace
    DSpace Express is a service operated by 
    Atmire NV