Skip to main content

Showing 1–3 of 3 results for author: Milenkoski, A

.
  1. arXiv:1410.1160  [pdf, other

    cs.CR eess.SY

    On Benchmarking Intrusion Detection Systems in Virtualized Environments

    Authors: Aleksandar Milenkoski, Samuel Kounev, Alberto Avritzer, Nuno Antunes, Marco Vieira

    Abstract: Modern intrusion detection systems (IDSes) for virtualized environments are deployed in the virtualization layer with components inside the virtual machine monitor (VMM) and the trusted host virtual machine (VM). Such IDSes can monitor at the same time the network and host activities of all guest VMs running on top of a VMM being isolated from malicious users of these VMs. We refer to IDSes for vi… ▽ More

    Submitted 5 October, 2014; originally announced October 2014.

    Comments: SPEC (Standard Performance Evaluation Corporation) Research Group --- IDS Benchmarking Working Group

    Report number: SPEC-RG-2013-002

  2. arXiv:1410.1159  [pdf, other

    cs.DC

    Cloud Usage Patterns: A Formalism for Description of Cloud Usage Scenarios

    Authors: Aleksandar Milenkoski, Alexandru Iosup, Samuel Kounev, Kai Sachs, Piotr Rygielski, Jason Ding, Walfredo Cirne, Florian Rosenberg

    Abstract: Cloud computing is becoming an increasingly lucrative branch of the existing information and communication technologies (ICT). Enabling a debate about cloud usage scenarios can help with attracting new customers, sharing best-practices, and designing new cloud services. In contrast to previous approaches, which have attempted mainly to formalize the common service delivery models (i.e., Infrastruc… ▽ More

    Submitted 5 October, 2014; originally announced October 2014.

    Comments: SPEC (Standard Performance Evaluation Corporation) Research Group --- Cloud Working Group

    Report number: SPEC-RG-2013-001

  3. arXiv:1410.1158  [pdf, other

    cs.CR

    Technical Information on Vulnerabilities of Hypercall Handlers

    Authors: Aleksandar Milenkoski, Marco Vieira, Bryan D. Payne, Nuno Antunes, Samuel Kounev

    Abstract: Modern virtualized service infrastructures expose attack vectors that enable attacks of high severity, such as attacks targeting hypervisors. A malicious user of a guest VM (virtual machine) may execute an attack against the underlying hypervisor via hypercalls, which are software traps from a kernel of a fully or partially paravirtualized guest VM to the hypervisor. The exploitation of a vulnerab… ▽ More

    Submitted 5 October, 2014; originally announced October 2014.

    Comments: SPEC (Standard Performance Evaluation Corporation) Research Group --- IDS Benchmarking Working Group

    Report number: SPEC-RG-2014-001