Skip to main content

Table 2 Classification of the attacks according to the worst consequences documented

From: Replica placement to mitigate attacks on clouds

Class of Attack

Real Case

Limited PMs

Denial of Service

 

VM-to-Hypervisor Attack

Limited Crash VMs

VM Software Faults

Lim. Byzantine VMs

Cross-VM Side-Channel

 

XML Signature Wrapping

 

Metadata Spoofing

Unlim. PMs/Byzant. VMs

Malware Injection

 

Hacking