Full Paper View Go Back

A Shared Memory Technique for Windows Environment Through Virtualization

Ganesan.T 1 , Tamizharasan.P 2 , Sabari Giri Murugan.S3

Section:Research Paper, Product Type: Journal
Vol.1 , Issue.4 , pp.17-22, Sep-2013

Online published on Oct 30, 2013


Copyright © Ganesan.T, Tamizharasan.P , Sabari Giri Murugan.S . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ganesan.T, Tamizharasan.P , Sabari Giri Murugan.S, “A Shared Memory Technique for Windows Environment Through Virtualization,” International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.17-22, 2013.

MLA Style Citation: Ganesan.T, Tamizharasan.P , Sabari Giri Murugan.S "A Shared Memory Technique for Windows Environment Through Virtualization." International Journal of Scientific Research in Network Security and Communication 1.4 (2013): 17-22.

APA Style Citation: Ganesan.T, Tamizharasan.P , Sabari Giri Murugan.S, (2013). A Shared Memory Technique for Windows Environment Through Virtualization. International Journal of Scientific Research in Network Security and Communication, 1(4), 17-22.

BibTex Style Citation:
@article{Murugan.S_2013,
author = {Ganesan.T, Tamizharasan.P , Sabari Giri Murugan.S},
title = {A Shared Memory Technique for Windows Environment Through Virtualization},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {9 2013},
volume = {1},
Issue = {4},
month = {9},
year = {2013},
issn = {2347-2693},
pages = {17-22},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=88},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=88
TI - A Shared Memory Technique for Windows Environment Through Virtualization
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Ganesan.T, Tamizharasan.P , Sabari Giri Murugan.S
PY - 2013
DA - 2013/10/30
PB - IJCSE, Indore, INDIA
SP - 17-22
IS - 4
VL - 1
SN - 2347-2693
ER -

5096 Views    4350 Downloads    4311 Downloads
  
  

Abstract :
In a network file sharing system, many practical algorithms to support Byzantine Fault-Tolerant distributed applications has been made in topical years. These solutions are designed to make the applications resistant to successful attacks alongside the system, thereby making services tolerant to intrusions. In recent times, some of these studies have considered the use of virtual machines for building a trusted computing environment. This project presents SMIT (Shared Memory based Intrusion Tolerance), an design for Intrusion Tolerance using virtual machines that benefits from a shared memory to simplify the consensus protocol. P2P overlay topologies and their dynamics, focusing on the modern network. We present Cruiser, a fast and exact P2P crawler, which can capture a complete snapshot of the network of more than one million peers in just a few minutes. Leveraging recent overlay snapshots captured with Cruiser, we distinguish the graph-related properties of individual overlay snapshots and overlay dynamics across slices of back-to-back snapshots. Our results reveal that while the network has dramatically grown and changed in many ways, it still exhibits the cluster and short path lengths of a small world network.

Key-Words / Index Term :
Virtual Machines, Memory, Intrusion, Network

References :
[1.] B. G. Chun, P. Maniatis, and S. Shenker, “Diverse replication for single-machine byzantine-fault tolerance,” in Proceedings of the 2010 USENIX Annual Technical Conference, 2010.
[2.] H. P. Reiser and R. Kapitza, “VM-FIT: Supporting intrusion tolerance with virtualization technology,” in Proceedings of the 1st Workshop on Recent Advances on Intrusion-Tolerant Systems, 2009, pp. 18–22.
[3.] M. Correia, N. Neves, L. Lung, and P. Verissimo,“Worm-IT–a wormhole-based intrusion-tolerant group communication system,” The Journal of Systems & Software, vol. 80, no. 2, pp. 178–197, 2009.
[4.] B. G. Chun, P. Maniatis, and S. Shenker, “Diverse replication for single-machine byzantine-fault tolerance,” in Proceedings of the 2010 USENIX Annual Technical Conference, 2010.
[5.] H. P. Reiser and R. Kapitza, “VM-FIT: Supporting intrusion tolerance with virtualization technology,” in Proceedings of the 1st Workshop on Recent Advances on Intrusion-Tolerant Systems, 2009, pp. 18–22.
[6.] M. Correia, N. Neves, L. Lung, and P. Verissimo,“Worm-IT–a wormhole-based intrusion-tolerant group communication system,” The Journal of Systems & Software, vol. 80, no. 2, pp. 178–197, 2009.
[7.] Wine Project, “Wine user guide,” http://www.winehq.com/site/docs/wine-user/index.
[8.] Kevin Lawton, Bryce Denney, N. David Guarneri, Volker Ruppert, Christophe Bothamy, and Michael Calabrese, “Bochs x86 pc emulator users manual,” http://bochs.sourceforge.net/, 2003.
[9.] “Transmeta corp crusoe processor,” http://www.erc.msstate.edu/ reese/EE8063/html/transmeta/transmeta.pdf.
[10.] “Qemu cpu emulator,” http://fabrice.bellard.free.fr/qemu/qemu-tech.html, 2004.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation