From: Virtual network security: threats, countermeasures, and challenges
Technique | Description | Examples |
---|---|---|
Full virtualization | The Virtual Machine Monitor emulates a complete machine, based on the underlying hardware architecture. The guest Operating System runs without any modification. | VMware Workstation,VirtualBox |
Paravirtualization | The Virtual Machine monitor emulates a machine which is similar to the underlyinghardware, with the addition of a hypervisor. The hypervisor allows the guest Operating System to run complex tasks directly on non-virtualized hardware. The guest OS must be modified in order to take advantage of this feature. | VMware ESX, Xen |
Container-basedvirtualization | Instead of running a full Virtual Machine, this technique provides Operating System-level containers, based on separate userspaces. In each container, the hardware, as well as the Operating System and its kernel, are identical to the underlying ones. | OpenVZ, Linux VServer |