Submit Search
Upload
IRJET - Analysis of Virtual Machine in Digital Forensics
•
0 likes
•
17 views
IRJET Journal
Follow
https://www.irjet.net/archives/V7/i3/IRJET-V7I3736.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
HelenOS is an open source operating system based on the microkernel multiserver design principles. One of its goals is to provide excellent target platform portability. From the time of its inception, HelenOS already supported 4 different hardware platforms and currently it supports platforms as diverse as x86, SPARCv9 and ARM. This talk presents practical experiences and lessons learned from porting HelenOS to RISC-V. While the unprivileged (user space) instruction set architecture of RISC-V has been declared stable in 2014, the privileged instruction set architecture is technically still allowed to change in the future. Likewise, many major design features and building blocks of HelenOS are already in place, but no official commitment to ABI or API stability has been made yet. This gives an interesting perspective on the pros and cons of both HelenOS and RISC-V. The talk also points to some possible research directions with respect to hardware/software co-design.
Lessons Learned from Porting HelenOS to RISC-V
Lessons Learned from Porting HelenOS to RISC-V
Martin Děcký
A Network Intrusion Detection System (NIDS) monitors a network for malicious activities or policy violations [1]. The Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on x86 hardware virtualization extensions [2]. We design and implement a back-propagation network intrusion detection system in KVM. Compared to traditional Back Propagation (BP) NIDS, the Particle Swarm Optimization (PSO) algorithm is applied to improve efficiency. The results show an improved system in terms of recall and precision along with missing detection rates.
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVM
International Journal of Innovation Engineering and Science Research
https://www.irjet.net/archives/V4/i6/IRJET-V4I685.pdf
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
IRJET Journal
Presented at International Conference on ICT Convergence 2013
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Mokpo National University
Abstract In widespread cloud environment cloud services is tremendously growing due to large amount of personal computation data. Deduplication process is used for avoiding the redundant data. A cloud storage environment for data backup in personal computing devices facing various challenge, of source deduplication for the cloud backup services with low deduplication efficiency. Challenges facing in the process of deduplication for cloud backup service are-1)Low deduplication efficiency due to exclusive access to large amount of data and limited system resources of PC based client site.2)Low data transfer efficiency due to transferring deduplicate data from source to backup server are typically small but that can be often across the WAN. Keywords- Cloud computing, Deduplication, cloud backup, application awareness
Survey on cloud backup services of personal storage
Survey on cloud backup services of personal storage
eSAT Journals
https://irjet.net/archives/V7/i2/IRJET-V7I221.pdf
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET Journal
In this paper the Authors present the design of a high performance transputer based fault-tolerant multiprocessor system for critical applications such as aircraft control, nuclear power station control, satellite applications etc. Fault-tolerant building blocks designed with potential for real time processing. The systematic architecture, regularity and recursiveness enables the system to be more fault-tolerant. Real-time applications have to function correctly even in the presence of faults. Link failure of the network is deeply analysed with reliability analysis.
Design and Structuring of a Multiprocessor System based on Transputers
Design and Structuring of a Multiprocessor System based on Transputers
IJERA Editor
Cloud Resilience with Open Stack using Fault-Injection Techniques. The Butterfly Effect Project.
Cloud Resilience with Open Stack
Cloud Resilience with Open Stack
Jorge Cardoso
Recommended
HelenOS is an open source operating system based on the microkernel multiserver design principles. One of its goals is to provide excellent target platform portability. From the time of its inception, HelenOS already supported 4 different hardware platforms and currently it supports platforms as diverse as x86, SPARCv9 and ARM. This talk presents practical experiences and lessons learned from porting HelenOS to RISC-V. While the unprivileged (user space) instruction set architecture of RISC-V has been declared stable in 2014, the privileged instruction set architecture is technically still allowed to change in the future. Likewise, many major design features and building blocks of HelenOS are already in place, but no official commitment to ABI or API stability has been made yet. This gives an interesting perspective on the pros and cons of both HelenOS and RISC-V. The talk also points to some possible research directions with respect to hardware/software co-design.
Lessons Learned from Porting HelenOS to RISC-V
Lessons Learned from Porting HelenOS to RISC-V
Martin Děcký
A Network Intrusion Detection System (NIDS) monitors a network for malicious activities or policy violations [1]. The Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on x86 hardware virtualization extensions [2]. We design and implement a back-propagation network intrusion detection system in KVM. Compared to traditional Back Propagation (BP) NIDS, the Particle Swarm Optimization (PSO) algorithm is applied to improve efficiency. The results show an improved system in terms of recall and precision along with missing detection rates.
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVM
International Journal of Innovation Engineering and Science Research
https://www.irjet.net/archives/V4/i6/IRJET-V4I685.pdf
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
IRJET Journal
Presented at International Conference on ICT Convergence 2013
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Mokpo National University
Abstract In widespread cloud environment cloud services is tremendously growing due to large amount of personal computation data. Deduplication process is used for avoiding the redundant data. A cloud storage environment for data backup in personal computing devices facing various challenge, of source deduplication for the cloud backup services with low deduplication efficiency. Challenges facing in the process of deduplication for cloud backup service are-1)Low deduplication efficiency due to exclusive access to large amount of data and limited system resources of PC based client site.2)Low data transfer efficiency due to transferring deduplicate data from source to backup server are typically small but that can be often across the WAN. Keywords- Cloud computing, Deduplication, cloud backup, application awareness
Survey on cloud backup services of personal storage
Survey on cloud backup services of personal storage
eSAT Journals
https://irjet.net/archives/V7/i2/IRJET-V7I221.pdf
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET Journal
In this paper the Authors present the design of a high performance transputer based fault-tolerant multiprocessor system for critical applications such as aircraft control, nuclear power station control, satellite applications etc. Fault-tolerant building blocks designed with potential for real time processing. The systematic architecture, regularity and recursiveness enables the system to be more fault-tolerant. Real-time applications have to function correctly even in the presence of faults. Link failure of the network is deeply analysed with reliability analysis.
Design and Structuring of a Multiprocessor System based on Transputers
Design and Structuring of a Multiprocessor System based on Transputers
IJERA Editor
Cloud Resilience with Open Stack using Fault-Injection Techniques. The Butterfly Effect Project.
Cloud Resilience with Open Stack
Cloud Resilience with Open Stack
Jorge Cardoso
https://www.irjet.net/archives/V6/i7/IRJET-V6I7131.pdf
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET Journal
https://www.irjet.net/archives/V6/i3/IRJET-V6I3670.pdf
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET Journal
The proposed work describes the design of a multimedia platform managing users and implementing cybersecurity. The paper describes in details the use cases of the whole platform embedding Big Data and artificial intelligence (AI) engine predicting network attacks. The platform has been tested by Tree Ensemble algorithm classifying and predicting anomalous server logs of possible attacks. The data logs are collected in Cassandra Big Data System enabling the AI training model. The work has been developed within the framework of a research industry project.
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
IJNSA Journal
https://irjet.net/archives/V5/i3/IRJET-V5I3117.pdf
IRJET- Sandbox Technology
IRJET- Sandbox Technology
IRJET Journal
Abstract The large scale IaaS systems could store virtual appliances in several repositories. The deployment time could heavily vary depending on the connection properties of the repository storing the appliance. A virtual appliance is a virtual machine image designed to run on a virtualization platform i.e. Virtual Box, Xen, VMware Workstation. Virtual appliance delivery requires the modification of the underlying IaaS systems. IaaS is the virtual delivery of computing resources in the form of hardware, networking, and storage services This concept will reduce the variance in deployment time by introducing the concept of online active repositories and appliance optimization. To provide efficient delivery time in IaaS and to increase the efficiency of IaaS (Infra structure as a service) system To calculate the delivery time when deployed it in the virtualized platform Combining the both online and manual repositories for calculating the delivery time To construct the appliance in online using various online repositories The constructed appliance is deployed in the virtualized platform (using virtual box). And the appliance is optimized for increasing the efficiency and decreasing the delivery time. The delivery time of the online appliance is compared with the appliance which has been created manually. Keywords- Cloud Computing, Virtualization, Virtual Appliance.
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Journals
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Publishing House
Virtualization and virtual situations are major basics for files input in cloud adding. It is assistances for together the visitor user and the worker while it provides the first with the features needed to execute his demand, it gives the second the capacity to be cover different guests with no extra cost. The essential component in a virtual design is called hypervisor, having extra-privileges, which makes it able to play major role of dealing the input of data and funds. This hypervisor has many advantages regarding the cost, the simplicity of performance, the availability. But in the other hand, the major character played by this group makes it the faultless target for mean users targeting to attack the near system. Arun Prasath. M | Mrs. T. Sathiyabama "Virtualization in Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18665.pdf
Virtualization in Cloud Computing
Virtualization in Cloud Computing
ijtsrd
Fnm wp byod_may13
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Flexera
REPORT1 new
REPORT1 new
sowmya seles
Cloud computing has a massive use of virtual machines to permit isolated workload to be used from one resource to the another and resource usages to be controlled. Migrating from one operating system to the other operating system is difficult. The virtual machines mainly deals with the live migration process. In this paper, we present the Performance of CPU in Virtual Machine with various features like Cluster, CPU, Live migration, Data Centers, Hosts, Storage, Disks, Templates. The multiprocessor is mainly used in the host machine which allow the features of guest operating system. There are various performance anomalies, which overheads for the infrastructure for the cloud. They are various implication for the results in the future architecture for the cloud infrastructure. Both the container and virtual machine support for the input output intensive application from future cloud allocated to the different application. The large number of the storage and network activity has to served for challenges on the platform. Cloud Computing in the virtual machine has high consumption of memory and CPU resource for inefficient virtualization software.
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
Editor IJCATR
https://irjet.net/archives/V7/i2/IRJET-V7I2131.pdf
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET Journal
https://irjet.net/archives/V4/i7/IRJET-V4I7650.pdf
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)
IRJET Journal
Recently, different kinds of computer systems like smart phones, embedded systems and cloud servers, are more and more widely used and the system development and validation is under great pressure. Hardware device, firmware and device driver development account for a significant portion of system development and validation effort. In traditional device, firmware and driver development largely has to wait until a stable version of the device becomes available. This dependency often leaves not enough time for software validation.
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
IJCSES Journal
Choudhary2015
Choudhary2015
Choudhary2015
Amit Kabra
CrazyBoy
Virtualization In Software Testing
Virtualization In Software Testing
Colloquium
Virtualization technology, which forms the infrastructure of data centers and cloud technology, is constantly evolving. The process that started with machine virtualization has turned into taking applications into containers and virtualizing applications. Virtualization aims at efficient use of hardware by sharing resources. Today, hypervisor and container based virtualization approach are widely used. Powerful servers that are physically operated thanks to hypervisor platforms are operated by installing different operating systems according to the need. When virtual machines use all the resources of the operating system on which they run, the container is shared only with the kernel of the operating system on which it is located. Thus, it offers faster and more services using fewer system resources. Container technology is widely used to operate data centers with minimum energy consumption and maximum business capacity with an environmentally friendly approach that is becoming widespread today. The ecosystem of virtualization and container technologies that constitute the infrastructure of cloud computing is presented in our study. Atilla Erguzen | Ahmet Ozcan | Erdal Erdal "Ecosystem of Virtualization Technologies" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38081.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-network/38081/ecosystem-of-virtualization-technologies/atilla-erguzen
Ecosystem of Virtualization Technologies
Ecosystem of Virtualization Technologies
ijtsrd
https://irjet.net/archives/V7/i2/IRJET-V7I2412.pdf
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET Journal
https://www.irjet.net/archives/V9/i5/IRJET-V9I5671.pdf
Object Detection Bot
Object Detection Bot
IRJET Journal
In this paper are discussed some results related to an industrial project oriented on the integration of data mining tools into Enterprise Service Bus (ESB) platform. WSO2 ESB has been implemented for data transaction and to interface a client web service connected to a KNIME workflow behaving as a flexible data mining engine. In order to validate the implementation two test have been performed: the first one is related to the data management of two relational database management system (RDBMS) merged into one database whose data have been processed by KNIME dashboard statistical tool thus proving the data transfer of the prototype system; the second one is related to a simulation of two sensor data belonging to two distinct production lines connected to the same ESB. Specifically in the second example has been developed a practical case by processing by a Multilayered Perceptron (MLP) neural networks the temperatures of two milk production lines and by providing information about predictive maintenance. The platform prototype system is suitable for data automatism and Internet of Thing (IoT) related to Industry 4.0, and it is suitable for innovative hybrid system embedding different hardware and software technologies integrated with ESB, data mining engine and client web-services.
ESB PLATFORM INTEGRATING KNIME DATA MINING TOOL ORIENTED ON INDUSTRY 4.0 BASE...
ESB PLATFORM INTEGRATING KNIME DATA MINING TOOL ORIENTED ON INDUSTRY 4.0 BASE...
ijaia
Virtual machine technology, or virtualization, is gaining momentum in the information technology community. While virtual machines are not a new concept, recent advances in hardware and software technology have brought virtualization to the forefront of IT management. Stability, cost savings, and manageability are among the reasons for the recent rise of virtualization. Virtual machine solutions can be classified by hardware, software, and operating system/containers. From its inception on the mainframe to distributed servers on x86, the virtual machine has matured and will play an increasing role in systems management.
Server Virtualization Architecture and Implementation
Server Virtualization Architecture and Implementation
Lockheed Martin
https://www.irjet.net/archives/V11/i1/IRJET-V11I1118.pdf
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1117.pdf
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to IRJET - Analysis of Virtual Machine in Digital Forensics
https://www.irjet.net/archives/V6/i7/IRJET-V6I7131.pdf
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET Journal
https://www.irjet.net/archives/V6/i3/IRJET-V6I3670.pdf
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET Journal
The proposed work describes the design of a multimedia platform managing users and implementing cybersecurity. The paper describes in details the use cases of the whole platform embedding Big Data and artificial intelligence (AI) engine predicting network attacks. The platform has been tested by Tree Ensemble algorithm classifying and predicting anomalous server logs of possible attacks. The data logs are collected in Cassandra Big Data System enabling the AI training model. The work has been developed within the framework of a research industry project.
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
IJNSA Journal
https://irjet.net/archives/V5/i3/IRJET-V5I3117.pdf
IRJET- Sandbox Technology
IRJET- Sandbox Technology
IRJET Journal
Abstract The large scale IaaS systems could store virtual appliances in several repositories. The deployment time could heavily vary depending on the connection properties of the repository storing the appliance. A virtual appliance is a virtual machine image designed to run on a virtualization platform i.e. Virtual Box, Xen, VMware Workstation. Virtual appliance delivery requires the modification of the underlying IaaS systems. IaaS is the virtual delivery of computing resources in the form of hardware, networking, and storage services This concept will reduce the variance in deployment time by introducing the concept of online active repositories and appliance optimization. To provide efficient delivery time in IaaS and to increase the efficiency of IaaS (Infra structure as a service) system To calculate the delivery time when deployed it in the virtualized platform Combining the both online and manual repositories for calculating the delivery time To construct the appliance in online using various online repositories The constructed appliance is deployed in the virtualized platform (using virtual box). And the appliance is optimized for increasing the efficiency and decreasing the delivery time. The delivery time of the online appliance is compared with the appliance which has been created manually. Keywords- Cloud Computing, Virtualization, Virtual Appliance.
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Journals
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
eSAT Publishing House
Virtualization and virtual situations are major basics for files input in cloud adding. It is assistances for together the visitor user and the worker while it provides the first with the features needed to execute his demand, it gives the second the capacity to be cover different guests with no extra cost. The essential component in a virtual design is called hypervisor, having extra-privileges, which makes it able to play major role of dealing the input of data and funds. This hypervisor has many advantages regarding the cost, the simplicity of performance, the availability. But in the other hand, the major character played by this group makes it the faultless target for mean users targeting to attack the near system. Arun Prasath. M | Mrs. T. Sathiyabama "Virtualization in Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18665.pdf
Virtualization in Cloud Computing
Virtualization in Cloud Computing
ijtsrd
Fnm wp byod_may13
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Flexera
REPORT1 new
REPORT1 new
sowmya seles
Cloud computing has a massive use of virtual machines to permit isolated workload to be used from one resource to the another and resource usages to be controlled. Migrating from one operating system to the other operating system is difficult. The virtual machines mainly deals with the live migration process. In this paper, we present the Performance of CPU in Virtual Machine with various features like Cluster, CPU, Live migration, Data Centers, Hosts, Storage, Disks, Templates. The multiprocessor is mainly used in the host machine which allow the features of guest operating system. There are various performance anomalies, which overheads for the infrastructure for the cloud. They are various implication for the results in the future architecture for the cloud infrastructure. Both the container and virtual machine support for the input output intensive application from future cloud allocated to the different application. The large number of the storage and network activity has to served for challenges on the platform. Cloud Computing in the virtual machine has high consumption of memory and CPU resource for inefficient virtualization software.
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
Editor IJCATR
https://irjet.net/archives/V7/i2/IRJET-V7I2131.pdf
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET Journal
https://irjet.net/archives/V4/i7/IRJET-V4I7650.pdf
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)
IRJET Journal
Recently, different kinds of computer systems like smart phones, embedded systems and cloud servers, are more and more widely used and the system development and validation is under great pressure. Hardware device, firmware and device driver development account for a significant portion of system development and validation effort. In traditional device, firmware and driver development largely has to wait until a stable version of the device becomes available. This dependency often leaves not enough time for software validation.
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
IJCSES Journal
Choudhary2015
Choudhary2015
Choudhary2015
Amit Kabra
CrazyBoy
Virtualization In Software Testing
Virtualization In Software Testing
Colloquium
Virtualization technology, which forms the infrastructure of data centers and cloud technology, is constantly evolving. The process that started with machine virtualization has turned into taking applications into containers and virtualizing applications. Virtualization aims at efficient use of hardware by sharing resources. Today, hypervisor and container based virtualization approach are widely used. Powerful servers that are physically operated thanks to hypervisor platforms are operated by installing different operating systems according to the need. When virtual machines use all the resources of the operating system on which they run, the container is shared only with the kernel of the operating system on which it is located. Thus, it offers faster and more services using fewer system resources. Container technology is widely used to operate data centers with minimum energy consumption and maximum business capacity with an environmentally friendly approach that is becoming widespread today. The ecosystem of virtualization and container technologies that constitute the infrastructure of cloud computing is presented in our study. Atilla Erguzen | Ahmet Ozcan | Erdal Erdal "Ecosystem of Virtualization Technologies" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38081.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-network/38081/ecosystem-of-virtualization-technologies/atilla-erguzen
Ecosystem of Virtualization Technologies
Ecosystem of Virtualization Technologies
ijtsrd
https://irjet.net/archives/V7/i2/IRJET-V7I2412.pdf
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET Journal
https://www.irjet.net/archives/V9/i5/IRJET-V9I5671.pdf
Object Detection Bot
Object Detection Bot
IRJET Journal
In this paper are discussed some results related to an industrial project oriented on the integration of data mining tools into Enterprise Service Bus (ESB) platform. WSO2 ESB has been implemented for data transaction and to interface a client web service connected to a KNIME workflow behaving as a flexible data mining engine. In order to validate the implementation two test have been performed: the first one is related to the data management of two relational database management system (RDBMS) merged into one database whose data have been processed by KNIME dashboard statistical tool thus proving the data transfer of the prototype system; the second one is related to a simulation of two sensor data belonging to two distinct production lines connected to the same ESB. Specifically in the second example has been developed a practical case by processing by a Multilayered Perceptron (MLP) neural networks the temperatures of two milk production lines and by providing information about predictive maintenance. The platform prototype system is suitable for data automatism and Internet of Thing (IoT) related to Industry 4.0, and it is suitable for innovative hybrid system embedding different hardware and software technologies integrated with ESB, data mining engine and client web-services.
ESB PLATFORM INTEGRATING KNIME DATA MINING TOOL ORIENTED ON INDUSTRY 4.0 BASE...
ESB PLATFORM INTEGRATING KNIME DATA MINING TOOL ORIENTED ON INDUSTRY 4.0 BASE...
ijaia
Virtual machine technology, or virtualization, is gaining momentum in the information technology community. While virtual machines are not a new concept, recent advances in hardware and software technology have brought virtualization to the forefront of IT management. Stability, cost savings, and manageability are among the reasons for the recent rise of virtualization. Virtual machine solutions can be classified by hardware, software, and operating system/containers. From its inception on the mainframe to distributed servers on x86, the virtual machine has matured and will play an increasing role in systems management.
Server Virtualization Architecture and Implementation
Server Virtualization Architecture and Implementation
Lockheed Martin
Similar to IRJET - Analysis of Virtual Machine in Digital Forensics
(20)
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
IRJET- Sandbox Technology
IRJET- Sandbox Technology
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
Virtualization in Cloud Computing
Virtualization in Cloud Computing
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
Meet the BYOD, ‘Computing Anywhere’ Challenge—Planning and License Management...
REPORT1 new
REPORT1 new
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
CPU Performance in Data Migrating from Virtual Machine to Physical Machine in...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
IRJET - A Comprehensive Review on Security Issues and Challenges in Lightweig...
Dockerization (Replacement of VMs)
Dockerization (Replacement of VMs)
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
Choudhary2015
Choudhary2015
Virtualization In Software Testing
Virtualization In Software Testing
Ecosystem of Virtualization Technologies
Ecosystem of Virtualization Technologies
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
Object Detection Bot
Object Detection Bot
ESB PLATFORM INTEGRATING KNIME DATA MINING TOOL ORIENTED ON INDUSTRY 4.0 BASE...
ESB PLATFORM INTEGRATING KNIME DATA MINING TOOL ORIENTED ON INDUSTRY 4.0 BASE...
Server Virtualization Architecture and Implementation
Server Virtualization Architecture and Implementation
More from IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1118.pdf
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1117.pdf
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1116.pdf
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1115.pdf
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1114.pdf
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1113.pdf
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1112.pdf
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1111.pdf
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1110.pdf
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1109.pdf
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1108.pdf
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1107.pdf
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1106.pdf
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1105.pdf
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1104.pdf
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1103.pdf
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1102.pdf
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1101.pdf
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1100.pdf
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I199.pdf
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
This portfolio contains selected projects I completed during my undergraduate studies. 2018 - 2023
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
Scaling in conventional MOSFET
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
RCC Institute of Information Technology
High-altitude bulk installation refers to the method of total assembling of small assembled units or loose parts directly in the design position, applicable to the installation of space structure such as space frame and reticulated shell.
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
wendy cai
Web web application
weather web application report.pdf
weather web application report.pdf
Pratik Pawar
Introduction to Machine Learning Notes
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
C Sai Kiran
Teaching effects after 128 hours of Building Information Modeling course in Cracow, Poland. Natalia works in Revit, Navisworks and Dynamo for BIM Coordination position. More https://bim.edu.pl or https://bimedu.eu
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
bim.edu.pl
Online movie ticket booking system for movies is a web-based program. This application allows users to purchase cinema tickets over the portal. To buy tickets, people must first register or log in. This website's backend is PHP and JavaScript, and the front end is HTML and CSS. All phases of the software development life cycle are efficiently managed in order to design and implement software. On the website, there are two panels: one for administrators and one for customers/users. The admin has the ability to add cinemas, movies, delete, halt execution, and add screens, among other things. The website is simple to navigate and appealing, saving the end user time.
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
Kamal Acharya
Used in finite element analysis
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptx
VishalDeshpande27
Laundry firms currently use a manual system for the management and maintenance of critical information. The current system requires numerous paper forms, with data stores spread throughout the laundry management infrastructure. Often information is incomplete or does not follow management standards. Records are often lost in transit during computation requiring a comprehensive auditing process to ensure that no vital information is lost. Multiple copies of the same information exist in the laundry firm data and may lead to inconsistencies in data in various data stores. A significant part of the operation of any laundry firm involves the acquisition, management and timely retrieval of great volumes of information. This information typically involves; customer personal information and clothing records history, user information, price of delivery and received date, users scheduling as regards customers details and dealings in service rendered, also our products package waiting list. All of this information must be managed in an efficient and cost wise fashion so that the organization resources may be effectively utilized. We present the design and implementation of a laundry database management system (LBMS) used in a laundry establishment. Laundry firms are usually faced with difficulties in keeping detailed records of customers clothing; this little problem as seen to most laundry firms is highly discouraging as customers are filled with disappointments, arising from issues such as customer clothes mix-ups and untimely retrieval of clothes. The aim of this application is to determine the number of clothes collected, in relation to their owners, as this also helps the users fix a date for the collection of their clothes. Also customer’s information is secured, as a specific id is allocated per registration to avoid contrasting information.
Laundry management system project report.pdf
Laundry management system project report.pdf
Kamal Acharya
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry. Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems. Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
ENERGY STORAGE DEVICES
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
VigneshvaranMech
fluid mechanics notes by devender poonia sir
fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answer
apareshmondalnita
Power quality
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
This document is by explosives industry in which document discussed manufacturing process and flow charts details by nitric acid and sulfuric acid and tetra benzene and step by step details of explosive industry explosives industry is produced raw materials and manufacture it by manufacturing process
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
884710SadaqatAli
This presentation is about nitration process of industries, unit processes of chemical engineering.
Halogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
fundamentals of drawing and difference between isometric and orthographic projection. Basic representation principles.
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projection
jeevanprasad8
Toll Tax Management System is a web based application that can provide all the information related to toll plazas and the passenger checks in and pays the amount, then he/she will be provided by a receipt. With this receipt he/she can leave the toll booth without waiting for any verification call. The information would also cover registration of staff, toll plaza collection, toll plaza collection entry for vehicles, date wise report entry, Vehicle passes and passes reports b/w dates.
Toll tax management system project report..pdf
Toll tax management system project report..pdf
Kamal Acharya
PHP and MySQL project on Hall Booking System is a web based project and it has been developed in PHP and MySQL and we can manage Payment, Booking, Inventory, Booking Dates, Customers and Hall from this project. The main objective to develop Hall Booking System PHP, MySQL, JAVA SCRIPT and BOOTSRAP Project is to overcome the manual errors and make a computerized system. In this project, there are various type of modules available to manage Customers, Booking, Payment. We can also generate reports for Booking, Payment, Booking Dates, Hall. Here the Payment module manage all the operations of Payment, Booking module can manage Booking, Inventory module is normally developed for managing Inventory, Booking Dates module manages Booking Dates operations, Customers module has been implemented to manage Customers. In this project all the modules like Payment, Booking Dates, Booking are tightly coupled and we can track the information easily. Ifyou are looking for Free Hall Booking System Project in PHP and MySQL then you can visit our free projects section. We can easily get the list of wedding halls & lawns in Nagpur. Also we have detailed contact information for some particular hall. But we cannot get the availability about hall. So background behind this web portal is that it gives the area wise listing of wedding halls & lawns with the detailed information of individual and also display for particular date the hall is available or not. Just dial is the system in which we can only find the name of Hall and Lawns in city. In just dial we cannot find Halls in specific area. This system cannot show all information about any Hall. This system is not able to book the Halls online. The A Web Based Hall Booking Management System is designed to overcome the disadvantage of previous system.We can easily get the list of Wedding Halls. But we cannot get the availability about Hall. So background behind this web portal is that it gives the area wise listing of Wedding Halls with the detailed information of individual and also display for particular date the Hall is available or not. This is a special type of web portal to easily get the information of all Wedding Halls in Nagpur which display separate calendar for separate Hall. For particular date the Hall. We can availability of Hall as well as Lawns detailed information about individuals Hall in our web portal . It provides all facilities to clients with lowest cost and lowest maintenance problems.
Hall booking system project report .pdf
Hall booking system project report .pdf
Kamal Acharya
In this project presentation, I will show you the design and build a simple Car Speed Detector circuit using Arduino UNO and IR Sensors. This Arduino Car Speed Detector project can be used to detect speed of a moving car. this is a very simple project idea to present. dept. of electrical and electronic engineering, university of chittagong.
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
Rased Khan
Recently uploaded
(20)
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
weather web application report.pdf
weather web application report.pdf
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptx
Laundry management system project report.pdf
Laundry management system project report.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answer
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
Halogenation process of chemical process industries
Halogenation process of chemical process industries
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projection
Toll tax management system project report..pdf
Toll tax management system project report..pdf
Hall booking system project report .pdf
Hall booking system project report .pdf
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
IRJET - Analysis of Virtual Machine in Digital Forensics
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3663 Analysis of Virtual Machine in Digital Forensics Jenita Ann Mathews1, Glenis P George2, Dhanalakshmi M P3 1 Student, Dept. of Computer Science, ER & DCI Institute of Technology, Trivandrum, Kerala, India 2Senior Engineer, Knowledge Resource Centre, CDAC, Trivandrum, Kerala, India 3Assistant Professor, ER & DCI Institute of Technology, Trivandrum, Kerala, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - With the advancement in virtualization technology, the use of virtual machines has been increased. A virtual machine also known as guest operating system can perform as an actual system and works as a normal computer and provides the complete functionality of an operating system to the user. As the popularity and the use of virtual machines increases, crimes involving them arealsoontherise. The wide use of virtualization technology is becoming a new challenge for digital forensics. However, where there is any new technology for good purpose, there is always its illegitimate usage as well. Virtual Forensics is a new trend in the area of digital forensics. The analysis of virtual machine monitor and associated virtual machine files is of utmost importance. This project proposes a sound forensics methodology to acquire and analyze the virtual machine files by utilizing the VMware and Oracle Virtual Box artifacts. Key Words: Virtualization, Virtual machine, Digital Forensics, VMware, Oracle Virtual Box 1. INTRODUCTION The concept of virtualization is taken from mainframe days of late 1960s and early 1970s. The company IBM spent a lot of time and effort in developing the shared usage of computer resources among a large group of users. The best way to improve the resource utilization is through the virtualization. Virtualization is a technology that enable multiple operating systems to run on a single host system. A software called hypervisors separate the physical resources from the virtual environments. There are two types of hypervisors, type 1 and type 2 hypervisor. VMware ESX/ESXi, Citrix Xen Server are examples of Type 1 hypervisor. Examples of type 2 hypervisors are VMware workstation, Oracle VirtualBox [1]. With the modernization in computer hardware and increase in processing powers of CPU, the use of virtual machines is on its peak. A virtual machine is a software implementation of a computer and executes programs likea host system. It uses physical resources of the host system on which it runs. Therefore, it is highly needed to understand this technology thoroughly from forensic point of view. The virtual machine can be used for both legitimate and illegitimate use. Legitimate use can be Software Testing, malware analysis, backups and disaster recovery of data centers or any research and development purpose [2]. Illegitimate use is when the virtual machine is used to perform any sort of criminal activity. That can be cybercrime, copyright infringement, money laundering, identify theft, child sexual abuse, pornography, and cyber terrorism etc. Digital forensics is a sequence of process of identifying, obtaining, analyzing and presentingevidencestothecourtto resolve a criminal case by observing and maintaining the integrity and authenticity of the evidence. With the advancement in virtualization technology virtual machines are becoming a subject of interest [10]. The applying of digital forensics in virtual machines is called as virtual machine forensics. Virtual machine is select as a good platform for committing crimes because of its hiding nature. Virtual machine is used as a forensic evidence to obtain valuable data. The analysis of virtual machine monitor and associated virtual machine files are significant in virtual machine forensics. Oracle Virtual box VM (virtual machine) software is used to create virtual machines in this project. The virtual hard disk file is analysed to retrieve all its contents. A user’s activity trail is recorded in the virtual machine is an important digital evidence in terms of digital forensics. The VMware workstation and oracle virtual box generates each virtual machine image, snapshot file, log and configuration file. Therefore, these files should be checked. This project proposed to analyse the evidences left by an attacker. This evidence will be helpful for the law enforcement to find the final suspect. 2. LITERATURE SURVEY Virtualization technology paved the wayforthegrowthof virtual machine forensics. The authors of the paper [2] focused the forensic analysis of VMware virtual machine in forensics and anti-forensics model. The analysis of virtual machine is done when anti-forensics measures are taken to hide or destroy the evidence in virtual machine. A damaged virtual machinedisk image iscomplex to examine becauseof the structural characteristics. Therefore, author of [3] have suggest an investigation procedure of digital forensics and data recovery method on the damaged virtual disk images of VMware Workstation. The live acquisitionmethodtoacquire the virtual machinefilesfromthehostsystemandanalysethe raw data stored in the grains is described in the paper [4]. G. Dorn and S. Conrad [5] analyses the impact of a virtual machine on a host machine. They discussed the trace evidence related to the installation and execution of virtual machines on a host machine. It provides useful information about the types and locations of files installed by
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3664 virtualization software,theprocessesandartifactscreatedby running virtual machines. The author of the paper [10] presented the forensic acquisition of virtual disk and the snapshot comparison analysis. 3. PROPOSED SYSTEM The block diagram of the proposed system is shown in Fig. 1. The block diagram of the proposed system is divided into three phases. The first phase is the detection and acquisition module. This involvestheidentificationofvirtual machines in the host system. By acquisition, the process of obtaining a binary bitwise copy of the entire contents of all digital media that are identified. The acquired evidence is preserved and standard hash signatures likeMD5orSHA1 is used to verify integrity of the digital evidence. The analysis phase module contains the analysis of virtual disk, log file, snapshot and configuration files. The third phase is reporting. It summarizes and provides explanation of conclusions. Fig.1: Block Diagram of Proposed System 4. SYSTEM STUDY Virtual Disk Image (.vdi) is the disk image created by Oracle Virtual Box. VDI is a method to create a copy/image/replica of a virtual machine’s hard disk to be later used for disk backup, restoration or copying to a new virtual machine. VDI files are written in little endian format. The VDI has four sections: A 72-byte pre header A standard header descriptor. This is following by padding to the next 1MB boundary (*). An image block map. If the (maximum) size of the virtual HDD is N MByte, then this map is 4N bytes long. Followed by more padding to the next 1MB boundary. Up to N x 1MByte image blocks. 5. SYSTEM DESIGN The system design includes the architecture diagram of the proposed system. This architectural diagram consists of three tiers. The three tiers are presentation layer, logical layer, Data Access Layer. Fig. 2 shows the architecture diagram of the proposed system. The presentation layer is the top most layer of the system. It contains the graphical user interface, which is the layer that having direct connection with the user. It is the interface that includes the analysis viewer and report viewer. Analysis viewergives the result of the analysis module and report viewer gives the detailed report. The logical layer is the layer in which the applications or activities done by the system are represented. This tier consist of different basic modules. Detection of Virtual machines from the host machine, VMWare VM log file analysis and the Oracle virtual Box Virtual Machine File Analysis. Each file is analyzed and the result is given to the analysis viewer. The third tier is the data layer. The data layer consists of the database managementmodule.Thislayercontainsall the virtual machine files in the VMware and Oracle Virtual Box. Fig. 2: Architecture Diagram 6. IMPLEMENTATION The proposed system in this paper is implemented using python 3.7 scripting language. Python has built-in capabilities to support cyber investigations and perform forensic analysis. Python play an important role in digital forensics. Python is a popular programming language and is used as tool for cyber security, penetration testing as well as digital forensic investigations. When the investigator select python as the investigation tool for digital forensics,heneed not need any other third party software for completing the task. Some of the unique features of python programming language that makes it good for digital forensics projects are simplicity of syntax, comprehensive inbuilt modules, cross platform compatible, provides various modules and functions. The host and guest operating system used in this paper is windows 10.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3665 The hardware and software requirements for this research work is given in table 1. Table 1: Hardware and Software Requirements Hardware Software Processor: Intel Core i3 or above OS: Windows 10 Speed: 1.3Ghz Oracle Virtual Box6.0 RAM: 4GB VMware Player 15.5.1 Disk: 10GB or more Anaconda 3-5.3.1 Python 3.7 Spyder 3.3.4 7. ANALYSIS AND RESULTS 7.1. Detection of Virtual Machine Investigator wants to check whether any virtual machine installed in the host machine. If he clicks the detect button, installed virtual machines are detected. Fig. 3 shows the GUI of detection phase. Fig. 4 and 5 show the virtual machines of the Oracle Virtual Box and VMware respectively. Fig. 3: GUI of the proposed system Fig. 4 : Oracle Virtual Box Virtual Machines Fig. 5 : Vmware Virtual Machines 7.2 VMware Log File Analysis Log file gives the information about the version of the VMware player software. It provides the host operating system, host system name and its specifications where the VMware player is installed. Log file of any virtual machine has a record of previously installed ISOs and showing the locations of previous ISOs. VMware log provides the details of connected USB devices. The list of connected USB devices that connected with the system at different timescanalsobe seen from log files. Log contains the USB Disk name along with its connection date/time and serial number of USB.Fig. 6 presents the output of VMware log file. Fig. 6 : Output of VMware Log File 7.3 Oracle Virtual Box Log File Analysis Fig. 7 presents the GUI of Oracle Virtual Box Forensic Analysis. There are four log files are created in the oracle virtual box. Selectorwindow.log, VBoxSVC.log, Vbox.log, Vboxhardening.log are the log files. Two of them are created at the time of installing the virtual box software. This is common to all virtual machines. Other two are separate for each virtual machine. Fig. 7: GUI of Oracle Virtual Box Forensic Analysis i. Selectorwindow.log This log file provides the information of virtual box installed date and time, last vm opened, host OS, host system product version, host RAM total space and available free space. process running behind the selector window is Virtual Box.exe. The fig.8 shows the output from the selectorwindow.log.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3666 Fig. 8: Output of Selectorwindow.log ii. VBoxSVC.log This log file gives the details about virtual box installed date and time, last virtual machine open time, host os, host system product version, host ram available free space and total space. It also provides the executables, process ID, location of the home directory where the oracle virtual box software is installed and the installed drivers list. All these details are shown in Fig. 9. Fig. 9: Output of VBoxSVC.log iii. VBox.log This log file gave the information of installed date and time, virtual machine open time, host os, host product version, host ram, executables, extension packs, guest os, shared clipboard, drag and drop, VM states. The output of VBox.log depicts in Fig. 10. Fig.10: Output of Vbox log Analysis iv. VBoxHardening.log This log provides installed dll in the virtual machines. It is shown in Fig. 11. Fig. 11: VboxHardening.log 7.4 Oracle Virtual Box Configuration File Analysis Oracle Virtual Box Configuration file contains .vbox, .vbox- prev, .xml and .xml-prev files. A VBOX file is a settings file used by Oracle VirtualBox virtual machine.). It is saved in an XML format and contains settings such as the virtual machine name, OS type, system memory.VBOXfilesareused for launching virtual machines. Vbox-prev is the back-upfile of the vbox file. Xml is a globally configured file. Xml-prev is the back-up file of xml file. Vbox file provides the information about the machine uuid, VM name, VM OS, Current Snapshot name, Snapshots saved folderdetails,Last State Changed date, ISO image location, name of the snapshots, description, virtual machine memory size. The output is shown in Fig. 12. Fig.12: Output of .vbox file Virtualbox.xml file contains the global saved settings of all the virtual machines. It contains the machine uuid, virtual machines installed location, DHCP server network name, IP address, network mask, system properties default machine folder and log history count which shown in Fig. 13.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3667 Fig. 13: Output of Xml file. 7.5 VDI File Analysis The VDI file contains a header section. The header of theVDI file is decoded and it provides the VDI header provides the information of file signature of VDI file, Version, header size, disk type, offset block, offset data, sector size,total block size in MB, total block count and the total allocated block count. VDI header decoded output is shown in Fig. 14. Fig. 14: VDI header The jpeg and mpeg files are carved from the vdi file. Nearly 1592 jpeg and 282 mpeg files are carved from the vdi file which shown in Fig. 15 and 16. Fig. 15: JPEG Files Carves Fig. 16: MPEG Files Carves In Kali linux, there is a file carving module called foremost, carved the other files such as avi, bmp, dll,exe, gif, htm, ole, png, wav, wmv etc. Output is shown in Fig. 17. Fig. 17: Output of VDI File The analysis shows the evidence that google chrome is installed in the windows 10 virtual machine and it was used for web browsing on the virtual machine. The details of the web browser history, web cookies, web accounts, web downloads are get from the vdi file. The results showingthat the user enter websites google, yahoo login page and some images are downloaded in the virtual machine. The information such as web search results, URLs, date and time accessed, email id of the user is got from the analysis of vdi file which is shown in Fig. 18. Web cookies resultisexhibited in Fig. 19. Fig. 18 : Web Search Results
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3668 Fig.19 : Web Cookies results 7.6 Snapshot File Analysis For snapshot analysis, two snapshots are needed. A clean snapshot of the VM before the activity and a snapshot after the activity is needed. Two snapshots are compared using the md5 hash values. Fig. 20 shows hash value comparison. Fig. 20: Hash Value Comparison The difference between snapshot vdi file and normal vdi file is identified by looking at the offset 0x4C, the disk type is 04 it is snapshot and 01 it is normal VDIwithdynamicdisk type. 8. CONCLUSIONS The recognition and understanding of virtualization software and virtual machine play an important role in digital forensics investigations.Therearea lotofartifactsare produced during the creation and execution of virtual machines. This paper clearly presented the analysis of log file, configuration file, snapshot files andthevirtual disk files of the Oracle Virtual machine. It also provides a detailed analysis of VMware log file. Based on the results which was obtained in the anlaysis of virtual machine and its associated files it can be concluded that the user activity trail can be found. A browser history analysis was carried out in the virtual machine to show that the activies of the user done in the website. REFERENCES [1] H Lee, “VirtualizationBasics:UnderstandingTechniques and Fundamentals,” School of Informatics and Computing, Indiana University 815 E 10th St. Bloomington, IN 47408, December 2014. [2] Hammad Riaz, Mohammad Ashraf Tahir,” Analysis of VMware Virtual Machine in Forensics andAntiForensics Paradigm”, 6th International Symposium on Digital Forensic and Security, July 2018 [3] S Lim, B Yoo, J Park, K Byun, S Lee, “A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine,” Mathematical and Computer Modelling, Volume 55, Issues 1–2, January 2012, Pages 151-160 [4] V. Meera, M.M. Isaac, C. Balan, "Forensic acquisition and analysis of VMware virtual machine artifacts", IEEE International MultiConference on Automation Computing Communication Control and Compressed Sensing (iMac4s), pp. 255-259, 22–23 March [5] G. Dorn, C. Marberry, S. Conrad and P. Craiger, “Analyzing the Impact Of A Virtual Machine On A Host Machine,” Advances in Digital Forensics V, Fifth International Conference on Digital Orlando, Florida, USA, January 26-28,2009 [6] Saumya Awasthi and Ajay Pratap, ”A Virtual Environment Forensic Tool”, International Journal of Cyber-Security and Digital Forensics, Volume 7 Issue 1,pp.63-71,April 2018. [7] Smita V. Khangar, G. H. R. C. E. Nagpur, and Rajiv V. Dharaskar,” Digital Forensic Investigation for Virtual Machines”, International Journal of Modeling and Optimization, Vol. 2, No. 6, pp. 663-664, December2012 [8] M. Hirwani. Y. Pan. B. Stackpole. D. Johnson, “Forensic Acquisition andAnalysis ofVMware.Virtual HardDisks,” 2012 Rochester Institute of Technology, Accessed from http://scholarworks.rit.edu/other/297 [9] Manjaiah D.H, Ezz El-Din Hemdan “Digital Forensics in Virtual Environment” CSI Magazine, March_2016. [10] ShaguftaRajguru, AayushPathak, Danish K. Chaus, Akshay J. Boramani “Design of Tool for Digital Forensics in Virtual Environment” International Journal of Computer Applications ,Volume 163 – No.4,April-2017
Download now