A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment

Cloud computing is a pool of scalable virtual resources serving a large number of users who pay fees depending on the extent of utilized service. From payment perspective, cloud is like electricity and water as people who use more of this shared pool should pay larger fees. Cloud computing involves...

Full description

Saved in:
Bibliographic Details
Published inThe Journal of supercomputing Vol. 73; no. 10; pp. 4407 - 4427
Main Authors Nezarat, Amin, Shams, Yaser
Format Journal Article
LanguageEnglish
Published New York Springer US 01.10.2017
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Cloud computing is a pool of scalable virtual resources serving a large number of users who pay fees depending on the extent of utilized service. From payment perspective, cloud is like electricity and water as people who use more of this shared pool should pay larger fees. Cloud computing involves a diverse set of technologies including networking, virtualization and transaction scheduling. Thus, it is vulnerable to a wide range of security threats. Some of the most important security issues threatening the cloud computing systems originate from virtualization technology, as it constitutes the main body and basis of these systems. The most important virtualization-based security threats include VM side channel, VM escape and rootkit attacks. The previous works on the subject of virtualization security rely on hardware approaches such as the use of firewalls, which are expensive, the use of schedulers to control the side channels along with noise injection, which impose high overhead, or the use of agents to collect information and send them back to a central intrusion detection system, which itself can become the target of attacker. In the method presented in this paper, a group of mobile agents act as the sensors of invalid actions in the cloud environment. They start a noncooperative game with the suspected attacker and then calculate the Nash equilibrium value and utility so as to differentiate an attack from legitimate requests and determine the severity of attack and its point of origin. The simulation results show that this method can detect the attacks with 86% accuracy. The use of mobile agents and their trainability feature has led to reduced system overhead and accelerated detection process.
AbstractList Cloud computing is a pool of scalable virtual resources serving a large number of users who pay fees depending on the extent of utilized service. From payment perspective, cloud is like electricity and water as people who use more of this shared pool should pay larger fees. Cloud computing involves a diverse set of technologies including networking, virtualization and transaction scheduling. Thus, it is vulnerable to a wide range of security threats. Some of the most important security issues threatening the cloud computing systems originate from virtualization technology, as it constitutes the main body and basis of these systems. The most important virtualization-based security threats include VM side channel, VM escape and rootkit attacks. The previous works on the subject of virtualization security rely on hardware approaches such as the use of firewalls, which are expensive, the use of schedulers to control the side channels along with noise injection, which impose high overhead, or the use of agents to collect information and send them back to a central intrusion detection system, which itself can become the target of attacker. In the method presented in this paper, a group of mobile agents act as the sensors of invalid actions in the cloud environment. They start a noncooperative game with the suspected attacker and then calculate the Nash equilibrium value and utility so as to differentiate an attack from legitimate requests and determine the severity of attack and its point of origin. The simulation results show that this method can detect the attacks with 86% accuracy. The use of mobile agents and their trainability feature has led to reduced system overhead and accelerated detection process.
Author Nezarat, Amin
Shams, Yaser
Author_xml – sequence: 1
  givenname: Amin
  surname: Nezarat
  fullname: Nezarat, Amin
  email: aminnezarat@pnu.ac.ir
  organization: Department of Computer Science and Engineering, Payame Noor University
– sequence: 2
  givenname: Yaser
  surname: Shams
  fullname: Shams, Yaser
  organization: Department of Computer Science and Engineering, Yazd Branch, Azad-e-Eslami University
BookMark eNp9kMtKAzEUhoNUsK0-gLuA62guM5OZZSneQHGjbkMmc9KmtklN0kLf3injQgRd5RD-71y-CRr54AGhS0avGaXyJjHGuSSUScIpL4k8QWNWSkFoURcjNKYNp6QuC36GJimtKKWFkGKMYIYXegM4LyFEyM6QVifocOdSjq7d5WMNGUx2weMN5GXosA0Rvz-THMjysIW4d6n_0Dlr85Gw89isw67D4PcuBr8Bn8_RqdXrBBff7xS93d2-zh_I08v943z2RIxgVSasFbwRhWwLy6itrG4b0zLKqdG26qSuW1lLLq0RvC2Bmk5WTSkrK2TJNVRCTNHV0Hcbw-cOUlarsIu-H6lYIxpe8qKo-pQcUiaGlCJYZVzWxwNz1G6tGFVHp2pwqnqn6uhUyZ5kv8htdBsdD_8yfGBSn_ULiD92-hP6An_oi-o
CitedBy_id crossref_primary_10_1007_s10586_018_2609_x
crossref_primary_10_1016_j_jisa_2020_102582
crossref_primary_10_1186_s13635_020_00110_1
crossref_primary_10_32604_iasc_2023_026360
crossref_primary_10_1007_s11227_018_2287_8
Cites_doi 10.3390/computers3010001
10.1016/j.future.2010.12.006
10.1109/JSAC.2003.818807
10.1007/s11227-012-0831-5
10.1007/s00766-013-0177-4
10.1016/j.protcy.2013.12.525
10.1002/spe.995
10.1016/j.jpdc.2014.06.007
10.1016/j.jnca.2010.06.008
10.5539/mas.v5n6p218
10.1109/SCC.2009.57
10.24297/ijct.v2i2b.2636
10.1109/ISSA.2011.6027519
10.1109/HPCA.2009.4798277
10.4018/IJCAC.2016010102
10.1007/s11227-016-1782-z
10.1109/MICRO.2008.4771781
10.1145/2345396.2345474
10.1109/CISE.2010.5677076
ContentType Journal Article
Copyright Springer Science+Business Media New York 2017
Copyright Springer Science & Business Media 2017
Copyright_xml – notice: Springer Science+Business Media New York 2017
– notice: Copyright Springer Science & Business Media 2017
DBID AAYXX
CITATION
DOI 10.1007/s11227-017-2025-7
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-0484
EndPage 4427
ExternalDocumentID 10_1007_s11227_017_2025_7
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
199
1N0
1SB
2.D
203
28-
29L
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
78A
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYOK
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDBF
ABDPE
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACUHS
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADQRH
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AI.
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
B0M
BA0
BBWZM
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EAD
EAP
EAS
EBD
EBLON
EBS
EDO
EIOEI
EJD
EMK
EPL
ESBYG
ESX
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
H~9
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P9O
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RNI
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
VH1
W23
W48
WH7
WK8
YLTOR
Z45
Z7R
Z7X
Z7Z
Z83
Z88
Z8M
Z8N
Z8R
Z8T
Z8W
Z92
ZMTXR
~8M
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
ABRTQ
ID FETCH-LOGICAL-c316t-1b329347b4f10f6fab9cb1020caf6d7a8b78727fc32b5e0cd769576f3752ae633
IEDL.DBID U2A
ISSN 0920-8542
IngestDate Fri Jul 25 05:35:50 EDT 2025
Tue Jul 01 03:04:27 EDT 2025
Thu Apr 24 22:54:31 EDT 2025
Fri Feb 21 02:27:33 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 10
Keywords Cloud computing
Nash equilibrium
Virtualization
Game theory
Intrusion detection systems
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-1b329347b4f10f6fab9cb1020caf6d7a8b78727fc32b5e0cd769576f3752ae633
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 1939252446
PQPubID 2043774
PageCount 21
ParticipantIDs proquest_journals_1939252446
crossref_citationtrail_10_1007_s11227_017_2025_7
crossref_primary_10_1007_s11227_017_2025_7
springer_journals_10_1007_s11227_017_2025_7
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2017-10-01
PublicationDateYYYYMMDD 2017-10-01
PublicationDate_xml – month: 10
  year: 2017
  text: 2017-10-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSubtitle An International Journal of High-Performance Computer Design, Analysis, and Use
PublicationTitle The Journal of supercomputing
PublicationTitleAbbrev J Supercomput
PublicationYear 2017
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Kandeeban, Rajesh (CR26) 2010; 10
Modi, Patel, Borisaniya, Patel, Rajarajan (CR1) 2013; 63
CR19
CR17
Liu, Ren, Bai (CR15) 2014; 9
CR16
CR11
Khalil, Khreishah, Azeem (CR12) 2014; 3
CR10
Gritzalis, Liu (CR2) 2013; 18
Lombardi, Di Pietro (CR18) 2011; 34
Fatema, Emeakaroha, Healy, Morrison, Lynn (CR5) 2014; 74
Avram (CR8) 2014; 12
CR3
Chandolikar, Nandavadekar (CR23) 2012; 2
Calheiros, Ranjan, Beloglazov, De Rose, Buyya (CR22) 2011; 41
CR7
CR29
CR28
CR9
CR27
CR24
CR20
Keromytis, Misra, Rubenstein (CR6) 2004; 22
Von Neumann, Morgenstern (CR14) 2007
Zissis, Lekkas (CR4) 2012; 28
Gibbons (CR13) 1992
Maskat, Shukran, Khairuddin, Isa (CR21) 2011; 5
Burney, Khan, Jilani (CR25) 2010; 10
K Maskat (2025_CR21) 2011; 5
2025_CR16
AD Keromytis (2025_CR6) 2004; 22
2025_CR17
D Zissis (2025_CR4) 2012; 28
R Gibbons (2025_CR13) 1992
2025_CR19
C Modi (2025_CR1) 2013; 63
2025_CR10
NS Chandolikar (2025_CR23) 2012; 2
2025_CR11
SS Kandeeban (2025_CR26) 2010; 10
J Neumann Von (2025_CR14) 2007
F Lombardi (2025_CR18) 2011; 34
K Fatema (2025_CR5) 2014; 74
RN Calheiros (2025_CR22) 2011; 41
2025_CR9
2025_CR7
MG Avram (2025_CR8) 2014; 12
2025_CR3
2025_CR27
2025_CR28
2025_CR29
IM Khalil (2025_CR12) 2014; 3
F Liu (2025_CR15) 2014; 9
2025_CR20
2025_CR24
SMA Burney (2025_CR25) 2010; 10
S Gritzalis (2025_CR2) 2013; 18
References_xml – volume: 3
  start-page: 1
  issue: 1
  year: 2014
  end-page: 35
  ident: CR12
  article-title: Cloud computing security: a survey
  publication-title: Computers
  doi: 10.3390/computers3010001
– ident: CR16
– ident: CR10
– volume: 28
  start-page: 583
  issue: 3
  year: 2012
  end-page: 592
  ident: CR4
  article-title: Addressing cloud computing security issues
  publication-title: Future Gener Comput Syst
  doi: 10.1016/j.future.2010.12.006
– volume: 9
  start-page: 1005
  issue: 4
  year: 2014
  end-page: 1013
  ident: CR15
  article-title: Mitigating cross-vm side channel attack on multiple tenants cloud platform
  publication-title: J Comput
– volume: 22
  start-page: 176
  issue: 1
  year: 2004
  end-page: 188
  ident: CR6
  article-title: SOS: an architecture for mitigating DDoS attacks
  publication-title: IEEE J Sel Areas Commun
  doi: 10.1109/JSAC.2003.818807
– ident: CR29
– volume: 63
  start-page: 561
  issue: 2
  year: 2013
  end-page: 592
  ident: CR1
  article-title: A survey on security issues and solutions at different layers of cloud computing
  publication-title: J Supercomput
  doi: 10.1007/s11227-012-0831-5
– volume: 10
  start-page: 87
  issue: 2
  year: 2010
  end-page: 92
  ident: CR26
  article-title: Integrated intrusion detection system using soft computing
  publication-title: IJ Netw Secur
– ident: CR27
– ident: CR19
– volume: 18
  start-page: 297
  issue: 4
  year: 2013
  ident: CR2
  article-title: Requirements engineering for security, privacy and services in cloud environments
  publication-title: Requir Eng
  doi: 10.1007/s00766-013-0177-4
– volume: 12
  start-page: 529
  year: 2014
  end-page: 534
  ident: CR8
  article-title: Advantages and challenges of adopting cloud computing from an enterprise perspective
  publication-title: Procedia Technol
  doi: 10.1016/j.protcy.2013.12.525
– volume: 41
  start-page: 23
  issue: 1
  year: 2011
  end-page: 50
  ident: CR22
  article-title: CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
  publication-title: Softw Pract Exp
  doi: 10.1002/spe.995
– volume: 74
  start-page: 2918
  issue: 10
  year: 2014
  end-page: 2933
  ident: CR5
  article-title: A survey of cloud monitoring tools: taxonomy, capabilities and objectives
  publication-title: J Parallel Distrib Comput
  doi: 10.1016/j.jpdc.2014.06.007
– ident: CR3
– ident: CR17
– volume: 34
  start-page: 1113
  issue: 4
  year: 2011
  end-page: 1122
  ident: CR18
  article-title: Secure virtualization for cloud computing
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2010.06.008
– ident: CR11
– volume: 5
  start-page: 218
  issue: 6
  year: 2011
  ident: CR21
  article-title: Mobile agents in intrusion detection system: review and analysis
  publication-title: Mod Appl Sci
  doi: 10.5539/mas.v5n6p218
– volume: 10
  start-page: 259
  issue: 10
  year: 2010
  ident: CR25
  article-title: Feature deduction and ensemble design of parallel neural networks for intrusion detection system
  publication-title: IJCSNS
– ident: CR9
– year: 1992
  ident: CR13
  publication-title: A primer in game theory
– year: 2007
  ident: CR14
  publication-title: Theory of games and economic behavior
– ident: CR7
– ident: CR28
– volume: 2
  start-page: 85
  issue: 2
  year: 2012
  end-page: 90
  ident: CR23
  article-title: Selection of relevant feature for intrusion attack classification by analyzing KDD Cup 99
  publication-title: MIT Int J Comput Sci Inf Technol
– ident: CR24
– ident: CR20
– volume: 63
  start-page: 561
  issue: 2
  year: 2013
  ident: 2025_CR1
  publication-title: J Supercomput
  doi: 10.1007/s11227-012-0831-5
– ident: 2025_CR24
  doi: 10.1109/SCC.2009.57
– volume: 12
  start-page: 529
  year: 2014
  ident: 2025_CR8
  publication-title: Procedia Technol
  doi: 10.1016/j.protcy.2013.12.525
– volume: 2
  start-page: 85
  issue: 2
  year: 2012
  ident: 2025_CR23
  publication-title: MIT Int J Comput Sci Inf Technol
  doi: 10.24297/ijct.v2i2b.2636
– ident: 2025_CR10
– volume: 3
  start-page: 1
  issue: 1
  year: 2014
  ident: 2025_CR12
  publication-title: Computers
  doi: 10.3390/computers3010001
– volume: 22
  start-page: 176
  issue: 1
  year: 2004
  ident: 2025_CR6
  publication-title: IEEE J Sel Areas Commun
  doi: 10.1109/JSAC.2003.818807
– ident: 2025_CR9
  doi: 10.1109/ISSA.2011.6027519
– volume: 10
  start-page: 87
  issue: 2
  year: 2010
  ident: 2025_CR26
  publication-title: IJ Netw Secur
– volume-title: Theory of games and economic behavior
  year: 2007
  ident: 2025_CR14
– ident: 2025_CR16
  doi: 10.1109/HPCA.2009.4798277
– volume: 5
  start-page: 218
  issue: 6
  year: 2011
  ident: 2025_CR21
  publication-title: Mod Appl Sci
  doi: 10.5539/mas.v5n6p218
– ident: 2025_CR29
  doi: 10.4018/IJCAC.2016010102
– ident: 2025_CR20
– volume: 18
  start-page: 297
  issue: 4
  year: 2013
  ident: 2025_CR2
  publication-title: Requir Eng
  doi: 10.1007/s00766-013-0177-4
– volume: 28
  start-page: 583
  issue: 3
  year: 2012
  ident: 2025_CR4
  publication-title: Future Gener Comput Syst
  doi: 10.1016/j.future.2010.12.006
– ident: 2025_CR28
  doi: 10.1007/s11227-016-1782-z
– ident: 2025_CR17
– ident: 2025_CR19
– volume: 41
  start-page: 23
  issue: 1
  year: 2011
  ident: 2025_CR22
  publication-title: Softw Pract Exp
  doi: 10.1002/spe.995
– ident: 2025_CR7
  doi: 10.1109/MICRO.2008.4771781
– volume-title: A primer in game theory
  year: 1992
  ident: 2025_CR13
– ident: 2025_CR3
  doi: 10.1145/2345396.2345474
– ident: 2025_CR27
– volume: 9
  start-page: 1005
  issue: 4
  year: 2014
  ident: 2025_CR15
  publication-title: J Comput
– ident: 2025_CR11
  doi: 10.1109/CISE.2010.5677076
– volume: 74
  start-page: 2918
  issue: 10
  year: 2014
  ident: 2025_CR5
  publication-title: J Parallel Distrib Comput
  doi: 10.1016/j.jpdc.2014.06.007
– volume: 34
  start-page: 1113
  issue: 4
  year: 2011
  ident: 2025_CR18
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2010.06.008
– volume: 10
  start-page: 259
  issue: 10
  year: 2010
  ident: 2025_CR25
  publication-title: IJCSNS
SSID ssj0004373
Score 2.171424
Snippet Cloud computing is a pool of scalable virtual resources serving a large number of users who pay fees depending on the extent of utilized service. From payment...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 4407
SubjectTerms Agents (artificial intelligence)
Cloud computing
Compilers
Computer Science
Computer simulation
Cybersecurity
Firewalls
Game theory
Interpreters
Intrusion detection systems
Processor Architectures
Programming Languages
Scheduling
Title A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment
URI https://link.springer.com/article/10.1007/s11227-017-2025-7
https://www.proquest.com/docview/1939252446
Volume 73
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagXVh4Iwql8sAEspTYsZ2MKbRUoDJRVKbIdmxAKimi6f_HzqMpCJCYYiWOhzuf77PuvjsAzg1nVChPo1RgggI_VUgSahCTlOqAyIhHjo08vmejSXA7pdOKx72os93rkGRxUjdkNx9jlybJrWZdD9ZN0KZ25PK4JjhuyJCkDCtH9l4U0gDXocyflvjqjBqE-S0oWvia4S7YrkAijEut7oENne2DnboBA6zs8QDoGD6LNw1XbETknFIKU1cN1zWycmOdF9lWGSybRUOLUuHjGOVz9GLvoPakWNgXIs8d2R6-ZlDN5ssUrhHgDsFkOHi4GqGqbwJSxGc58iWxTjzgMjC-Z5gRMlLSAglPCcNSLkJprRRzowiWVHsq5Syy1w5DOMVCM0KOQCubZ_oYQOUJERqhhfRdiFYJKkMVRtJ3BOwgUh3g1QJMVFVU3PW2mCVNOWQn88TKPHEyT3gHXKx-eS8ravw1uVtrJamMa5FYzBlhanEJ64DLWlNrn39b7ORfs0_BFnY7pUjc64JW_rHUZxaA5LIH2nH_uj90z5unu0Gv2ICfZujVgA
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagDLDwRhQKeGACWUrs2E7GCoEKtJ1a1M2yHRuQSopo-v-x82gKAiS2KHE83MP3WXffHQCXljMqdWBQKjFBUZhqpAi1iClKTURUwhPPRh4MWW8cPUzopOJxz-tq9zolWZzUDdktxNiXSXKnWT-DdR1sOCwQe1Me425DhiRlWjlx96KYRrhOZf60xddg1CDMb0nRItbc7YLtCiTCbqnVPbBmsn2wUw9ggJU_HgDThc_yzcAlGxH5oJTC1HfD9YOs_LPJi2qrDJbDoqFDqfBpgPIZenF3UHdSzN0LmeeebA9fM6ins0UKVwhwh2B8dzu66aFqbgLSJGQ5ChVxQTziKrJhYJmVKtHKAYlAS8tSLmPlvBRzqwlW1AQ65Sxx1w5LOMXSMEKOQCubZeYYQB1IGVtppAp9ilZLqmIdJyr0BOwo0W0Q1AIUumoq7mdbTEXTDtnLXDiZCy9zwdvgavnLe9lR46_FnVoronKuuXCYM8HU4RLWBte1plY-_7bZyb9WX4DN3mjQF_374eMp2MLeaooivg5o5R8Lc-bASK7OC-P7BDwH1W0
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagSIiFN6JQwAMTyGpix3YyVkBVHq0YKOoW2Y4NSCWtaPr_sfNoCgIktihxPNzZvs-6--4D4NxwRoXyNEoEJijwE4UkoQYxSakOiIx45NjI_QHrDYO7ER2VOqezqtq9SkkWnAbXpSnN2tPEtGvim4-xK5nk1stOj3UVrAWODGwX9BB3amIkKVLMkb0jhTTAVVrzpym-BqYabX5LkOZxp7sNNkvACDuFh3fAik53wVYlxgDLvbkHdAe-iHcNF8xE5AJUAhPXGdeJWrlnneWVVykshKOhRazwuY-yCXq191F7aszsC5FljngP31KoxpN5ApfIcPtg2L15uuqhUkMBKeKzDPmS2IAecBkY3zPMCBkpaUGFp4RhCRehtDsWc6MIllR7KuEsslcQQzjFQjNCDkAjnaT6EEDlCREaoYX0XbpWCSpDFUbSd2TsIFJN4FUGjFXZYNzpXIzjujWys3lsbR47m8e8CS4Wv0yL7hp_DW5VXonLjTaLLf6MMLUYhTXBZeWppc-_TXb0r9FnYP3xuhs_3A7uj8EGdosmr-drgUb2MdcnFpdk8jRfe5-avNmg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+game+theoretic-based+distributed+detection+method+for+VM-to-hypervisor+attacks+in+cloud+environment&rft.jtitle=The+Journal+of+supercomputing&rft.au=Nezarat%2C+Amin&rft.au=Shams%2C+Yaser&rft.date=2017-10-01&rft.issn=0920-8542&rft.eissn=1573-0484&rft.volume=73&rft.issue=10&rft.spage=4407&rft.epage=4427&rft_id=info:doi/10.1007%2Fs11227-017-2025-7&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11227_017_2025_7
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0920-8542&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0920-8542&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0920-8542&client=summon