Abstract
With the popularity of using virtual environments, it urges important measures that increase its security, as well as maintain a good user experience. A widespread attack is a denial of service which proposes to break the availability of service through a large number of illegitimate requests employing all computing resources of the target and degrading the user experience. In order to be effective in this particular type of attack, usually powerful equipment or a combination of them is required. This article proposes a new approach to this attack through a language-based Erlang application, which uses the processing power of a low-cost device. Its use would open the possibility of effective attacks coming from devices with less processing power, or from IoT devices, but capable of at least degrading the experience of a legitimate user, anonymously.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur. Gener. Comput. Syst. 25(6), 599–616 (2009)
Gao, H., Huang, W., Duan, Y.: The cloud-edge-based dynamic reconfiguration to service workflow for mobile ecommerce environments: a QoS prediction perspective. ACM Trans. Internet Technol. (TOIT) 21(1), 1–23 (2021)
Gao, H., Liu, C., Li, Y., Yang, X.: V2VR: reliable hybrid-network-oriented V2V data transmission and routing considering RSUs and connectivity probability. IEEE Trans. Intell. Transp. Syst. 22(6), 3533–3546 (2020)
Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P.: The cost of a cloud: research problems in data center networks (2008)
Hwang, I., Pedram, M.: Hierarchical, portfolio theory-based virtual machine consolidation in a compute cloud. IEEE Trans. Serv. Comput. 11(1), 63–77 (2016)
Jain, R., Paul, S.: Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun. Mag. 51(11), 24–31 (2013)
Le, T.: A survey of live virtual machine migration techniques. Computer Sci. Rev. 38, 100304 (2020)
Mell, P., Grance, T., et al.: The nist definition of cloud computing (2011)
Mosa, A., Sakellariou, R.: Dynamic virtual machine placement considering CPU and memory resource requirements. In: 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 196–198. IEEE (2019)
Nasim, R., Taheri, J., Kassler, A.J.: Optimizing virtual machine consolidation in virtualized datacenters using resource sensitivity. In: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 168–175. IEEE (2016)
Niclausse, N.: Tsung documentation (2000)
Sanfilippo, S., et al.: Hping-active network security tool (2008)
Tanenbaum, A.S., Feamster, N., Wetherall, D.J.: Computer Networks, 6th edn. Pearson Education India (2020)
Virding, R., Wikström, C., Williams, M.: Concurrent Programming in ERLANG. Prentice Hall International (UK) Ltd. (1996)
Wood, T., Shenoy, P., Venkataramani, A., Yousif, M.: Sandpiper: black-box and gray-box resource management for virtual machines. Comput. Netw. 53(17), 2923–2938 (2009)
Zhu, Y., Zhang, W., Chen, Y., Gao, H.: A novel approach to workload prediction using attention-based lstm encoder-decoder network in cloud environment. EURASIP J. Wirel. Commun. Netw. 2019(1), 1–18 (2019)
Acknowledgements
This work has been conducted under the project “BIOMA – Bioeconomy integrated solutions for the mobilization of the Agri-food market” (POCI-01-0247-FEDER-046112), by “BIOMA” Consortium, and financed by the European Regional Development Fund (FEDER), through the Incentive System to Research and Technological Development, within the Portugal2020 Competitiveness and Internationalization Operational Program.
The authors are grateful to the Foundation for Science and Technology (FCT, Portugal) for financial support through national funds FCT/MCTES (PIDDAC) to CeDRI (UIDB/05757/2020 and UIDP/05757/2020) and SusTEC (LA/P/0007/2021).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Mendes, A. (2022). Management of Virtual Environments with Emphasis on Security. In: Pereira, A.I., Košir, A., Fernandes, F.P., Pacheco, M.F., Teixeira, J.P., Lopes, R.P. (eds) Optimization, Learning Algorithms and Applications. OL2A 2022. Communications in Computer and Information Science, vol 1754. Springer, Cham. https://doi.org/10.1007/978-3-031-23236-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-23236-7_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-23235-0
Online ISBN: 978-3-031-23236-7
eBook Packages: Computer ScienceComputer Science (R0)