Skip to main content

Table 3 Placement strategies according to attack type and majority goal

From: Replica placement to mitigate attacks on clouds

PM Maj.

VM Maj.

Real Case

Irrelevant

Irrelevant

Denial of Service

  

VM-to-Hypervisor Attack

Balanced

Irrelevant

VM Software Faults

Unbalanced

Balanced

Cross-VM Side-Channel

  

XML Signature Wrapping

  

Metadata Spoofing

Irrelevant

Balanced

Malware Injection

  

Hacking