Title : 
Virtualized hosting: Devising a security policy through log analysis
         
        
            Author : 
Guster, Dennis C. ; Lee, Olivia F. ; Rogers, Dustin C.
         
        
            Author_Institution : 
Dept. of Inf. Syst., St. Cloud State Univ., St. Cloud, MN, USA
         
        
        
        
        
            Abstract : 
The paper provides an overview of three common virtualization threats that have been observed in log files in the authors´ network and suggests solutions to mitigate those security vulnerabilities. The solutions offered have been implemented on a network with over 200 hosts 40 of which are virtualized.
         
        
            Keywords : 
security of data; virtualisation; log analysis; security policy; security vulnerability; virtualization threat; virtualized hosting; Computers; Hardware; Monitoring; Random access memory; Security; Virtual machining; Wide area networks; Virtualization; log disaster recovery; security policy;
         
        
        
        
            Conference_Titel : 
Applications of Digital Information and Web Technologies (ICADIWT), 2011 Fourth International Conference on the
         
        
            Conference_Location : 
Stevens Point, WI
         
        
            Print_ISBN : 
978-1-4244-9824-6
         
        
        
            DOI : 
10.1109/ICADIWT.2011.6041399