A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment
Cloud computing is a pool of scalable virtual resources serving a large number of users who pay fees depending on the extent of utilized service. From payment perspective, cloud is like electricity and water as people who use more of this shared pool should pay larger fees. Cloud computing involves...
Saved in:
Published in | The Journal of supercomputing Vol. 73; no. 10; pp. 4407 - 4427 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.10.2017
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Cloud computing is a pool of scalable virtual resources serving a large number of users who pay fees depending on the extent of utilized service. From payment perspective, cloud is like electricity and water as people who use more of this shared pool should pay larger fees. Cloud computing involves a diverse set of technologies including networking, virtualization and transaction scheduling. Thus, it is vulnerable to a wide range of security threats. Some of the most important security issues threatening the cloud computing systems originate from virtualization technology, as it constitutes the main body and basis of these systems. The most important virtualization-based security threats include VM side channel, VM escape and rootkit attacks. The previous works on the subject of virtualization security rely on hardware approaches such as the use of firewalls, which are expensive, the use of schedulers to control the side channels along with noise injection, which impose high overhead, or the use of agents to collect information and send them back to a central intrusion detection system, which itself can become the target of attacker. In the method presented in this paper, a group of mobile agents act as the sensors of invalid actions in the cloud environment. They start a noncooperative game with the suspected attacker and then calculate the Nash equilibrium value and utility so as to differentiate an attack from legitimate requests and determine the severity of attack and its point of origin. The simulation results show that this method can detect the attacks with 86% accuracy. The use of mobile agents and their trainability feature has led to reduced system overhead and accelerated detection process. |
---|---|
AbstractList | Cloud computing is a pool of scalable virtual resources serving a large number of users who pay fees depending on the extent of utilized service. From payment perspective, cloud is like electricity and water as people who use more of this shared pool should pay larger fees. Cloud computing involves a diverse set of technologies including networking, virtualization and transaction scheduling. Thus, it is vulnerable to a wide range of security threats. Some of the most important security issues threatening the cloud computing systems originate from virtualization technology, as it constitutes the main body and basis of these systems. The most important virtualization-based security threats include VM side channel, VM escape and rootkit attacks. The previous works on the subject of virtualization security rely on hardware approaches such as the use of firewalls, which are expensive, the use of schedulers to control the side channels along with noise injection, which impose high overhead, or the use of agents to collect information and send them back to a central intrusion detection system, which itself can become the target of attacker. In the method presented in this paper, a group of mobile agents act as the sensors of invalid actions in the cloud environment. They start a noncooperative game with the suspected attacker and then calculate the Nash equilibrium value and utility so as to differentiate an attack from legitimate requests and determine the severity of attack and its point of origin. The simulation results show that this method can detect the attacks with 86% accuracy. The use of mobile agents and their trainability feature has led to reduced system overhead and accelerated detection process. |
Author | Nezarat, Amin Shams, Yaser |
Author_xml | – sequence: 1 givenname: Amin surname: Nezarat fullname: Nezarat, Amin email: aminnezarat@pnu.ac.ir organization: Department of Computer Science and Engineering, Payame Noor University – sequence: 2 givenname: Yaser surname: Shams fullname: Shams, Yaser organization: Department of Computer Science and Engineering, Yazd Branch, Azad-e-Eslami University |
BookMark | eNp9kMtKAzEUhoNUsK0-gLuA62guM5OZZSneQHGjbkMmc9KmtklN0kLf3injQgRd5RD-71y-CRr54AGhS0avGaXyJjHGuSSUScIpL4k8QWNWSkFoURcjNKYNp6QuC36GJimtKKWFkGKMYIYXegM4LyFEyM6QVifocOdSjq7d5WMNGUx2weMN5GXosA0Rvz-THMjysIW4d6n_0Dlr85Gw89isw67D4PcuBr8Bn8_RqdXrBBff7xS93d2-zh_I08v943z2RIxgVSasFbwRhWwLy6itrG4b0zLKqdG26qSuW1lLLq0RvC2Bmk5WTSkrK2TJNVRCTNHV0Hcbw-cOUlarsIu-H6lYIxpe8qKo-pQcUiaGlCJYZVzWxwNz1G6tGFVHp2pwqnqn6uhUyZ5kv8htdBsdD_8yfGBSn_ULiD92-hP6An_oi-o |
CitedBy_id | crossref_primary_10_1007_s10586_018_2609_x crossref_primary_10_1016_j_jisa_2020_102582 crossref_primary_10_1186_s13635_020_00110_1 crossref_primary_10_32604_iasc_2023_026360 crossref_primary_10_1007_s11227_018_2287_8 |
Cites_doi | 10.3390/computers3010001 10.1016/j.future.2010.12.006 10.1109/JSAC.2003.818807 10.1007/s11227-012-0831-5 10.1007/s00766-013-0177-4 10.1016/j.protcy.2013.12.525 10.1002/spe.995 10.1016/j.jpdc.2014.06.007 10.1016/j.jnca.2010.06.008 10.5539/mas.v5n6p218 10.1109/SCC.2009.57 10.24297/ijct.v2i2b.2636 10.1109/ISSA.2011.6027519 10.1109/HPCA.2009.4798277 10.4018/IJCAC.2016010102 10.1007/s11227-016-1782-z 10.1109/MICRO.2008.4771781 10.1145/2345396.2345474 10.1109/CISE.2010.5677076 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media New York 2017 Copyright Springer Science & Business Media 2017 |
Copyright_xml | – notice: Springer Science+Business Media New York 2017 – notice: Copyright Springer Science & Business Media 2017 |
DBID | AAYXX CITATION |
DOI | 10.1007/s11227-017-2025-7 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1573-0484 |
EndPage | 4427 |
ExternalDocumentID | 10_1007_s11227_017_2025_7 |
GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 199 1N0 1SB 2.D 203 28- 29L 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 78A 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYOK AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDBF ABDPE ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACUHS ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADQRH ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AI. AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. B0M BA0 BBWZM BDATZ BGNMA BSONS CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EAD EAP EAS EBD EBLON EBS EDO EIOEI EJD EMK EPL ESBYG ESX F5P FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ H~9 I-F I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P9O PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RNI ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW VH1 W23 W48 WH7 WK8 YLTOR Z45 Z7R Z7X Z7Z Z83 Z88 Z8M Z8N Z8R Z8T Z8W Z92 ZMTXR ~8M ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ACSTC ADHKG ADKFA AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION ABRTQ |
ID | FETCH-LOGICAL-c316t-1b329347b4f10f6fab9cb1020caf6d7a8b78727fc32b5e0cd769576f3752ae633 |
IEDL.DBID | U2A |
ISSN | 0920-8542 |
IngestDate | Fri Jul 25 05:35:50 EDT 2025 Tue Jul 01 03:04:27 EDT 2025 Thu Apr 24 22:54:31 EDT 2025 Fri Feb 21 02:27:33 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Keywords | Cloud computing Nash equilibrium Virtualization Game theory Intrusion detection systems |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c316t-1b329347b4f10f6fab9cb1020caf6d7a8b78727fc32b5e0cd769576f3752ae633 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 1939252446 |
PQPubID | 2043774 |
PageCount | 21 |
ParticipantIDs | proquest_journals_1939252446 crossref_citationtrail_10_1007_s11227_017_2025_7 crossref_primary_10_1007_s11227_017_2025_7 springer_journals_10_1007_s11227_017_2025_7 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2017-10-01 |
PublicationDateYYYYMMDD | 2017-10-01 |
PublicationDate_xml | – month: 10 year: 2017 text: 2017-10-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationSubtitle | An International Journal of High-Performance Computer Design, Analysis, and Use |
PublicationTitle | The Journal of supercomputing |
PublicationTitleAbbrev | J Supercomput |
PublicationYear | 2017 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | Kandeeban, Rajesh (CR26) 2010; 10 Modi, Patel, Borisaniya, Patel, Rajarajan (CR1) 2013; 63 CR19 CR17 Liu, Ren, Bai (CR15) 2014; 9 CR16 CR11 Khalil, Khreishah, Azeem (CR12) 2014; 3 CR10 Gritzalis, Liu (CR2) 2013; 18 Lombardi, Di Pietro (CR18) 2011; 34 Fatema, Emeakaroha, Healy, Morrison, Lynn (CR5) 2014; 74 Avram (CR8) 2014; 12 CR3 Chandolikar, Nandavadekar (CR23) 2012; 2 Calheiros, Ranjan, Beloglazov, De Rose, Buyya (CR22) 2011; 41 CR7 CR29 CR28 CR9 CR27 CR24 CR20 Keromytis, Misra, Rubenstein (CR6) 2004; 22 Von Neumann, Morgenstern (CR14) 2007 Zissis, Lekkas (CR4) 2012; 28 Gibbons (CR13) 1992 Maskat, Shukran, Khairuddin, Isa (CR21) 2011; 5 Burney, Khan, Jilani (CR25) 2010; 10 K Maskat (2025_CR21) 2011; 5 2025_CR16 AD Keromytis (2025_CR6) 2004; 22 2025_CR17 D Zissis (2025_CR4) 2012; 28 R Gibbons (2025_CR13) 1992 2025_CR19 C Modi (2025_CR1) 2013; 63 2025_CR10 NS Chandolikar (2025_CR23) 2012; 2 2025_CR11 SS Kandeeban (2025_CR26) 2010; 10 J Neumann Von (2025_CR14) 2007 F Lombardi (2025_CR18) 2011; 34 K Fatema (2025_CR5) 2014; 74 RN Calheiros (2025_CR22) 2011; 41 2025_CR9 2025_CR7 MG Avram (2025_CR8) 2014; 12 2025_CR3 2025_CR27 2025_CR28 2025_CR29 IM Khalil (2025_CR12) 2014; 3 F Liu (2025_CR15) 2014; 9 2025_CR20 2025_CR24 SMA Burney (2025_CR25) 2010; 10 S Gritzalis (2025_CR2) 2013; 18 |
References_xml | – volume: 3 start-page: 1 issue: 1 year: 2014 end-page: 35 ident: CR12 article-title: Cloud computing security: a survey publication-title: Computers doi: 10.3390/computers3010001 – ident: CR16 – ident: CR10 – volume: 28 start-page: 583 issue: 3 year: 2012 end-page: 592 ident: CR4 article-title: Addressing cloud computing security issues publication-title: Future Gener Comput Syst doi: 10.1016/j.future.2010.12.006 – volume: 9 start-page: 1005 issue: 4 year: 2014 end-page: 1013 ident: CR15 article-title: Mitigating cross-vm side channel attack on multiple tenants cloud platform publication-title: J Comput – volume: 22 start-page: 176 issue: 1 year: 2004 end-page: 188 ident: CR6 article-title: SOS: an architecture for mitigating DDoS attacks publication-title: IEEE J Sel Areas Commun doi: 10.1109/JSAC.2003.818807 – ident: CR29 – volume: 63 start-page: 561 issue: 2 year: 2013 end-page: 592 ident: CR1 article-title: A survey on security issues and solutions at different layers of cloud computing publication-title: J Supercomput doi: 10.1007/s11227-012-0831-5 – volume: 10 start-page: 87 issue: 2 year: 2010 end-page: 92 ident: CR26 article-title: Integrated intrusion detection system using soft computing publication-title: IJ Netw Secur – ident: CR27 – ident: CR19 – volume: 18 start-page: 297 issue: 4 year: 2013 ident: CR2 article-title: Requirements engineering for security, privacy and services in cloud environments publication-title: Requir Eng doi: 10.1007/s00766-013-0177-4 – volume: 12 start-page: 529 year: 2014 end-page: 534 ident: CR8 article-title: Advantages and challenges of adopting cloud computing from an enterprise perspective publication-title: Procedia Technol doi: 10.1016/j.protcy.2013.12.525 – volume: 41 start-page: 23 issue: 1 year: 2011 end-page: 50 ident: CR22 article-title: CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms publication-title: Softw Pract Exp doi: 10.1002/spe.995 – volume: 74 start-page: 2918 issue: 10 year: 2014 end-page: 2933 ident: CR5 article-title: A survey of cloud monitoring tools: taxonomy, capabilities and objectives publication-title: J Parallel Distrib Comput doi: 10.1016/j.jpdc.2014.06.007 – ident: CR3 – ident: CR17 – volume: 34 start-page: 1113 issue: 4 year: 2011 end-page: 1122 ident: CR18 article-title: Secure virtualization for cloud computing publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2010.06.008 – ident: CR11 – volume: 5 start-page: 218 issue: 6 year: 2011 ident: CR21 article-title: Mobile agents in intrusion detection system: review and analysis publication-title: Mod Appl Sci doi: 10.5539/mas.v5n6p218 – volume: 10 start-page: 259 issue: 10 year: 2010 ident: CR25 article-title: Feature deduction and ensemble design of parallel neural networks for intrusion detection system publication-title: IJCSNS – ident: CR9 – year: 1992 ident: CR13 publication-title: A primer in game theory – year: 2007 ident: CR14 publication-title: Theory of games and economic behavior – ident: CR7 – ident: CR28 – volume: 2 start-page: 85 issue: 2 year: 2012 end-page: 90 ident: CR23 article-title: Selection of relevant feature for intrusion attack classification by analyzing KDD Cup 99 publication-title: MIT Int J Comput Sci Inf Technol – ident: CR24 – ident: CR20 – volume: 63 start-page: 561 issue: 2 year: 2013 ident: 2025_CR1 publication-title: J Supercomput doi: 10.1007/s11227-012-0831-5 – ident: 2025_CR24 doi: 10.1109/SCC.2009.57 – volume: 12 start-page: 529 year: 2014 ident: 2025_CR8 publication-title: Procedia Technol doi: 10.1016/j.protcy.2013.12.525 – volume: 2 start-page: 85 issue: 2 year: 2012 ident: 2025_CR23 publication-title: MIT Int J Comput Sci Inf Technol doi: 10.24297/ijct.v2i2b.2636 – ident: 2025_CR10 – volume: 3 start-page: 1 issue: 1 year: 2014 ident: 2025_CR12 publication-title: Computers doi: 10.3390/computers3010001 – volume: 22 start-page: 176 issue: 1 year: 2004 ident: 2025_CR6 publication-title: IEEE J Sel Areas Commun doi: 10.1109/JSAC.2003.818807 – ident: 2025_CR9 doi: 10.1109/ISSA.2011.6027519 – volume: 10 start-page: 87 issue: 2 year: 2010 ident: 2025_CR26 publication-title: IJ Netw Secur – volume-title: Theory of games and economic behavior year: 2007 ident: 2025_CR14 – ident: 2025_CR16 doi: 10.1109/HPCA.2009.4798277 – volume: 5 start-page: 218 issue: 6 year: 2011 ident: 2025_CR21 publication-title: Mod Appl Sci doi: 10.5539/mas.v5n6p218 – ident: 2025_CR29 doi: 10.4018/IJCAC.2016010102 – ident: 2025_CR20 – volume: 18 start-page: 297 issue: 4 year: 2013 ident: 2025_CR2 publication-title: Requir Eng doi: 10.1007/s00766-013-0177-4 – volume: 28 start-page: 583 issue: 3 year: 2012 ident: 2025_CR4 publication-title: Future Gener Comput Syst doi: 10.1016/j.future.2010.12.006 – ident: 2025_CR28 doi: 10.1007/s11227-016-1782-z – ident: 2025_CR17 – ident: 2025_CR19 – volume: 41 start-page: 23 issue: 1 year: 2011 ident: 2025_CR22 publication-title: Softw Pract Exp doi: 10.1002/spe.995 – ident: 2025_CR7 doi: 10.1109/MICRO.2008.4771781 – volume-title: A primer in game theory year: 1992 ident: 2025_CR13 – ident: 2025_CR3 doi: 10.1145/2345396.2345474 – ident: 2025_CR27 – volume: 9 start-page: 1005 issue: 4 year: 2014 ident: 2025_CR15 publication-title: J Comput – ident: 2025_CR11 doi: 10.1109/CISE.2010.5677076 – volume: 74 start-page: 2918 issue: 10 year: 2014 ident: 2025_CR5 publication-title: J Parallel Distrib Comput doi: 10.1016/j.jpdc.2014.06.007 – volume: 34 start-page: 1113 issue: 4 year: 2011 ident: 2025_CR18 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2010.06.008 – volume: 10 start-page: 259 issue: 10 year: 2010 ident: 2025_CR25 publication-title: IJCSNS |
SSID | ssj0004373 |
Score | 2.171424 |
Snippet | Cloud computing is a pool of scalable virtual resources serving a large number of users who pay fees depending on the extent of utilized service. From payment... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 4407 |
SubjectTerms | Agents (artificial intelligence) Cloud computing Compilers Computer Science Computer simulation Cybersecurity Firewalls Game theory Interpreters Intrusion detection systems Processor Architectures Programming Languages Scheduling |
Title | A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment |
URI | https://link.springer.com/article/10.1007/s11227-017-2025-7 https://www.proquest.com/docview/1939252446 |
Volume | 73 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagXVh4Iwql8sAEspTYsZ2MKbRUoDJRVKbIdmxAKimi6f_HzqMpCJCYYiWOhzuf77PuvjsAzg1nVChPo1RgggI_VUgSahCTlOqAyIhHjo08vmejSXA7pdOKx72os93rkGRxUjdkNx9jlybJrWZdD9ZN0KZ25PK4JjhuyJCkDCtH9l4U0gDXocyflvjqjBqE-S0oWvia4S7YrkAijEut7oENne2DnboBA6zs8QDoGD6LNw1XbETknFIKU1cN1zWycmOdF9lWGSybRUOLUuHjGOVz9GLvoPakWNgXIs8d2R6-ZlDN5ssUrhHgDsFkOHi4GqGqbwJSxGc58iWxTjzgMjC-Z5gRMlLSAglPCcNSLkJprRRzowiWVHsq5Syy1w5DOMVCM0KOQCubZ_oYQOUJERqhhfRdiFYJKkMVRtJ3BOwgUh3g1QJMVFVU3PW2mCVNOWQn88TKPHEyT3gHXKx-eS8ravw1uVtrJamMa5FYzBlhanEJ64DLWlNrn39b7ORfs0_BFnY7pUjc64JW_rHUZxaA5LIH2nH_uj90z5unu0Gv2ICfZujVgA |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagDLDwRhQKeGACWUrs2E7GCoEKtJ1a1M2yHRuQSopo-v-x82gKAiS2KHE83MP3WXffHQCXljMqdWBQKjFBUZhqpAi1iClKTURUwhPPRh4MWW8cPUzopOJxz-tq9zolWZzUDdktxNiXSXKnWT-DdR1sOCwQe1Me425DhiRlWjlx96KYRrhOZf60xddg1CDMb0nRItbc7YLtCiTCbqnVPbBmsn2wUw9ggJU_HgDThc_yzcAlGxH5oJTC1HfD9YOs_LPJi2qrDJbDoqFDqfBpgPIZenF3UHdSzN0LmeeebA9fM6ins0UKVwhwh2B8dzu66aFqbgLSJGQ5ChVxQTziKrJhYJmVKtHKAYlAS8tSLmPlvBRzqwlW1AQ65Sxx1w5LOMXSMEKOQCubZeYYQB1IGVtppAp9ilZLqmIdJyr0BOwo0W0Q1AIUumoq7mdbTEXTDtnLXDiZCy9zwdvgavnLe9lR46_FnVoronKuuXCYM8HU4RLWBte1plY-_7bZyb9WX4DN3mjQF_374eMp2MLeaooivg5o5R8Lc-bASK7OC-P7BDwH1W0 |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagSIiFN6JQwAMTyGpix3YyVkBVHq0YKOoW2Y4NSCWtaPr_sfNoCgIktihxPNzZvs-6--4D4NxwRoXyNEoEJijwE4UkoQYxSakOiIx45NjI_QHrDYO7ER2VOqezqtq9SkkWnAbXpSnN2tPEtGvim4-xK5nk1stOj3UVrAWODGwX9BB3amIkKVLMkb0jhTTAVVrzpym-BqYabX5LkOZxp7sNNkvACDuFh3fAik53wVYlxgDLvbkHdAe-iHcNF8xE5AJUAhPXGdeJWrlnneWVVykshKOhRazwuY-yCXq191F7aszsC5FljngP31KoxpN5ApfIcPtg2L15uuqhUkMBKeKzDPmS2IAecBkY3zPMCBkpaUGFp4RhCRehtDsWc6MIllR7KuEsslcQQzjFQjNCDkAjnaT6EEDlCREaoYX0XbpWCSpDFUbSd2TsIFJN4FUGjFXZYNzpXIzjujWys3lsbR47m8e8CS4Wv0yL7hp_DW5VXonLjTaLLf6MMLUYhTXBZeWppc-_TXb0r9FnYP3xuhs_3A7uj8EGdosmr-drgUb2MdcnFpdk8jRfe5-avNmg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+game+theoretic-based+distributed+detection+method+for+VM-to-hypervisor+attacks+in+cloud+environment&rft.jtitle=The+Journal+of+supercomputing&rft.au=Nezarat%2C+Amin&rft.au=Shams%2C+Yaser&rft.date=2017-10-01&rft.issn=0920-8542&rft.eissn=1573-0484&rft.volume=73&rft.issue=10&rft.spage=4407&rft.epage=4427&rft_id=info:doi/10.1007%2Fs11227-017-2025-7&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11227_017_2025_7 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0920-8542&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0920-8542&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0920-8542&client=summon |