Vulnerability and Risk Assessment of XEN Hypervisor

aut.relation.conferenceAmericas Conference on Information Systemsen_NZ
aut.researcherLitchfield, Alan
dc.contributor.authorLitchfield, Aen_NZ
dc.contributor.authorShahzad, Aen_NZ
dc.contributor.editorSchwarz, Aen_NZ
dc.contributor.editorStafford, Ten_NZ
dc.contributor.editorHirschheim, Ren_NZ
dc.date.accessioned2019-02-18T21:17:16Z
dc.date.available2019-02-18T21:17:16Z
dc.date.copyright2018-08-16en_NZ
dc.date.issued2018-08-16en_NZ
dc.description.abstractA vulnerability prediction and risk assessment process for the Xen hypervisor that predicts the number of vulnerabilities and levels of risk a specific software version provides is presented. The hypervisor is a key component of virtualisation and is thus a target of attackers. When such critical infrastructure is compromised, then the assets of service consumers are consequently at risk. The benefit of a risk analysis process is that it provides surety for Cloud services consumers (making the Cloud Computing option more attractive) and assists Systems Administrators in decision making about software choices and version upgrades. The process has been tested on three popular open source, infrastructure level software packages. In each case, the level of predictive accuracy is excellent to good. The study combines quantitative and qualitative methods to predict vulnerabilities and determine risk levels.
dc.identifier.citationTwenty-fourth Americas Conference on Information Systems,Information Systems Security and Privacy, New Orleans, Louisiana, August 16-18, 2018.
dc.identifier.urihttps://hdl.handle.net/10292/12262
dc.publisherAIS
dc.relation.urihttps://aisel.aisnet.org/amcis2018/Security/Presentations/9/
dc.rightsCopyright © 2018 Association for Information Systems (AIS) http://aisel.aisnet.org. All rights reserved. NOTICE: this is the author’s version of a work that was accepted for publication. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in (see Citation). The original publication is available at (see Publisher's Version).
dc.rights.accessrightsOpenAccessen_NZ
dc.subjectVulnerability and risk assessment; XEN hypervisor; Threat actors; User classification; Threat level identification
dc.titleVulnerability and Risk Assessment of XEN Hypervisoren_NZ
dc.typeConference Contribution
pubs.elements-id338012
pubs.organisational-data/AUT
pubs.organisational-data/AUT/Design & Creative Technologies
pubs.organisational-data/AUT/Design & Creative Technologies/Engineering, Computer & Mathematical Sciences
pubs.organisational-data/AUT/PBRF
pubs.organisational-data/AUT/PBRF/PBRF Design and Creative Technologies
pubs.organisational-data/AUT/PBRF/PBRF Design and Creative Technologies/PBRF ECMS
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
AMCIS_2018Submission20180501-Camera.pdf
Size:
758.34 KB
Format:
Adobe Portable Document Format
Description:
Conference contribution
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
AUT Grant of Licence for Scholarly Commons Feb2017.pdf
Size:
239.25 KB
Format:
Adobe Portable Document Format
Description: