Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 1 Comparison summary of surveyed systems

From: A survey on securing the virtual cloud

Cloud security implementation Reduces attack surface (lines of code) Malware detection Mitigates zero-day threats Added overhead (%)
Malaware > 725 K Yes No No data
Guest view casting > 1,600 K Yes No Reduced up to 70%
Virtual snort > 300 K Yes No No data
Hybrid IDS > 300 K Yes No ~4-36%
VMwall ~ 1,600 K Yes No 1-7%
ReVirt ~ 1,800 K No Yes 8-58%
NSE-H > 1,600 K No No 15%
Shype ~ 11 k No No < 1%
Shype with Chinese wall in critical path > 1,600 K No No 9.1%
Shype with Chinese wall outside critical path > 1,600 k No No < 1%
NoHype < 1,600 K No No Reduced up to 1%
CReW > 270 K Yes Yes ~48-347%
Hypervisor-based proactive recovery ~ 1,600 K Yes Yes ~8-12.7%
Bear ~ 11 k Not applicable Yes < 1%