Comparative Study of Intrusion Detection Systems in Cloud Computing



Similar documents
A Review on Network Intrusion Detection System Using Open Source Snort

Keyword: Cloud computing, service model, deployment model, network layer security.

A Review on Intrusion Detection System to Protect Cloud Data

Overview - Snort Intrusion Detection System in Cloud Environment

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka.

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Taxonomy of Intrusion Detection System

IDS / IPS. James E. Thiel S.W.A.T.

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

IDS : Intrusion Detection System the Survey of Information Security

An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

SURVEY OF INTRUSION DETECTION SYSTEM

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Network Based Intrusion Detection Using Honey pot Deception

Intrusion Detection from Simple to Cloud

Banking Security using Honeypot

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL

Security Issues in Cloud Computing

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

Introduction of Intrusion Detection Systems

Architecture Overview

Passing PCI Compliance How to Address the Application Security Mandates

IDSaaS: Intrusion Detection System as a Service in Public Clouds

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Intrusion Detection Systems (IDS)

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Security and Privacy in Cloud Computing

Performance Evaluation of Intrusion Detection Systems

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Speedy Signature Based Intrusion Detection System Using Finite State Machine and Hashing Techniques

Security Controls for the Autodesk 360 Managed Services

Second-generation (GenII) honeypots

Secure Software Programming and Vulnerability Analysis

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Where every interaction matters.


IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

FACING SECURITY CHALLENGES

HOST BASED INTERNAL INTRUSION DETECTION AND PREVENTION SYSTEM.

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

The Cyber Threat Profiler

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Network- vs. Host-based Intrusion Detection

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

Preprocessing Web Logs for Web Intrusion Detection

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

05.0 Application Development

CLOUD COMPUTING, SECURITY IMPLICATIONS AND BEST PRACTICES

Guidelines for Web applications protection with dedicated Web Application Firewall

Name. Description. Rationale

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Wireless Network Security

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

From Network Security To Content Filtering

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

INTRUSION DETECTION SYSTEMS and Network Security

Implementation of Botcatch for Identifying Bot Infected Hosts

A Secure Authenticate Framework for Cloud Computing Environment

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

74% 96 Action Items. Compliance

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Self-Defending Approach of a Network

Two State Intrusion Detection System Against DDos Attack in Wireless Network

Security Policy JUNE 1, SalesNOW. Security Policy v v

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

A Novel Frame Work to Detect Malicious Attacks in Web Applications

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

ICTN Enterprise Database Security Issues and Solutions

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

SANS Top 20 Critical Controls for Effective Cyber Defense

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Network Security Demonstration - Snort based IDS Integration -

RAVEN, Network Security and Health for the Enterprise

Audit Logging. Overall Goals

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

A PREVENTION OF DDOS ATTACKS IN CLOUD USING NEIF TECHNIQUES

Network Security Monitoring

Sitefinity Security and Best Practices

Thick Client Application Security

Transcription:

Comparative Study of Intrusion Detection Systems in Cloud Computing Naresh Kumar a, Shalini Sharma b, * a Computer Engineering department, U.I.E.T, Kurukshetra University Kurukshetra, India b Computer Engineering department, U.I.E.T, Kurukshetra University, Kurukshetra India Abstract Cloud Computing have the capability to avoid wastage of resources, reduction of cost, flexibility, ease of service and mobility. This has resulted in the widespread prevalence of this service. Cloud Environment is distributed in nature. Thus, they are easy targets of the intruders. Intrusion Detection System is an appropriate system for detection and prevention of intrusions. There are various IDS available for cloud depending upon the nature of attack. This paper focuses on the comparative study of type of IDS in Cloud. Keywords: Cloud Computing, Intrusion Detection System, HIDS, NIDS, DIDS. 1. Introduction Information & technology has made drastic shift toward Cloud Computing in past few years. The framework and design of Cloud provides lots of advantages in terms of high availability, ease of use, low cost and Quality of Service. According to National Institute of standards and Technology Cloud Computing is defined as: Cloud Computing is a model which allows user accessibility to a convenient, spontaneous network access to a shared stack of configurable computing resources (e.g., networks, storages, servers, services and application) that can be provisioned frequently and released with minimal management effort or service provider interaction. This cloud model endorses availability and is comprised of four deployment models, three service models, and five essential characteristics, [1]. The IT sector has revolutionized with the phenomenal success of Cloud Computing. However there are some security issues associated with cloud. International Data Corporation (IDC) [2] carried out two surveys in the year 2008 and 2009 and placed security as the topmost issue in the path of success of Cloud. According to Cloud Security Alliance (CSA) [3] too top threats to cloud are: (a) Abuse and nefarious use of cloud computing, (b) Insecure Interfaces and APIs, (c) Malicious Insiders, (d) Shared technology issues, (e) leakage or loss of data, (f) Account or Service hijacking, (g) Unknown risk profiles. Thus, a defense measure is required to protect Cloud from such attacks. Intrusion Detection System is one of the most reliable mechanisms for Security of cloud. 2. Security Issues in Cloud Cloud Computing has emerged as the most important part of the IT sector. But the latest concern of the Cloud is security. The need of security is at various levels of Cloud.i.e. Network level, host level and application level. The various security issues associated with various levels of Cloud are given as follows. The classification is based on discussion in [4] for Amazon EC2 and as given in [5] 2.1. Basic Security The prevalence of latest technologies like Web 2.0 has resulted in giving more importance to Security. The attacks observed over web are: SQL Injection Attacks Cross Site Scripting Attacks Man in the Middle Attack * Corresponding author. Tel: +91-9996490411,9467012567 E-mails: naresh_duhan@rediffmail.com, shalini7151@gmail.com 740

2.2. Network level Security There are different types of networks in cloud like public, private, hybrid. Each type of network has some threats. The possible network level Security threats are: DNS Attacks Sniffer Attacks Issue of Reused IP Addresses BGP Prefix IP Address 2.3 Application level Security The security of hardware and software resources is included in the Application level Security. The main purpose of this Application level Security is to protect application from any kind of hazards. Security related issues at Application level are: Denial of Service Attack Cookie Poisoning Backdoor Attacks Distributed Denial of Service Attacks CAPTCHA Breaking 3. Cloud Computing & its Security Requirements As there are issues regarding security of the cloud there are its countermeasures too. The potential solutions to the issues related to cloud can be [6]: Application Programming Interfaces of the Cloud (API) must be standardized Keeping low overhead over communication and computation Encryption of data and shredding the key Provision of backup service to the user by Cloud Service providers Time to time updation and patching of operating system and other Cloud related services To perform integrity checks over the instance of service being used To clean up cookies from time to time Use of Intrusion Detection Systems. 4. Intrusion Detection System Intrusion Detection System is one of the efficient solution to issues hindering the successful running of cloud. An Intrusion Detection System monitors the network and system for any malicious activity and report to the administrator to take an appropriate action against it [5]. Some IDS automatically take action against the malicious activity by blocking it on its own and some take action as instructed by the user. The components of Intrusion Detection System are [7]: 4.1 Network Sensors Sensors are like an eye on IDS. It monitors and analyzes an activity over network. It can be placed on any side of network. 4.2 Alert Systems It is a system which creates an alert on detection of an unwanted activity. A circumstance that enables the alert system to send messages is called a trigger. 4.3 Command Console Response System It provides the graphical interface to the IDS. 4.4 Database for Attack Signatures and behaviour IDS do not have the capability to make decisions on their own regarding attack. It can identify the attack from the source of information which is Database. 5. Requirements of an Intrusion Detection System An IDS must meet certain requirements to fulfil the security of the cloud or any network. These requirements are discussed as follows [6]: 5.1. Identification and Authentication This approach involves verification and validation of the users to protect their profiles. This is achieved by using a username and password. 5.2. Authorization This concept is used to provide privileges to the designated users. It maintains referential integrity. 5.3. Confidentiality The confidential data must be kept secure from the unauthorized access by the Cloud Service Provider. Confidentiality is defined as the assurance that sensitive information is not disclosed to unauthorized persons, processes, or devices [8]. 5.4. Integrity Integrity is consistency and accuracy of data stored in the cloud. The data remains even after any modification or alteration. 5.5. Non-Repudiation Non-Repudiation can be attained in Cloud through various traditional technologies like token passing, 741

confirmation receipts services, timestamps, and digital signature. 5.6. Availability In rate limiting mechanism a threshold value is set for the packets entering the network. If the numbers of packets entering the network exceeds this threshold value then it is considered as an attack. 5.7. Intrusion Detection System By using intrusion detection systems at host and network level can prevent any kind of intrusion in the network. 6. Classification of IDS 6.3 Distributed IDS (DIDS) Distributed IDS [11] integrates both types of sensors. DIDS consists of large number of IDS scattered over the large network. These IDS are arranged in the network in such a way that they can communicate with each or are connected to the central server. Thus, it provides an advanced level of monitoring, analysis of incident and prompt attack data. A DIDS consists of three components: DIDS Director, LAN monitor and series of Host monitors [12]. The DIDS Director analyzes the data which it receives from LAN monitor and Host monitors. The analyzed data is reported to the main controller. The LAN monitors LAN and reports suspicious activities the DIDS Director. Similarly, the Host LAN monitors the host machine and reports suspicious activity or any kind of intrusion to DIDS Director. Facts [12] There are many different types of Intrusion Detection Systems to prevent attacks. An Intrusion Detection System can be classified as: Host-based Intrusion Detection System (HIDS), Network based Intrusion Detection System (NIDS), Distributed Intrusion Detection System (DIDS). The process of implementing DIDS is lengthy. It is very difficult to maintain liaison between large number monitors. The process of DIDS is hierarchal. 6.1 Host based IDS (HIDS) Host based Intrusion Detection Systems [9] have sensors which focuses only on single host for the detection of the intrusion. A HIDS monitors the incoming and outgoing packets from the host and alerts the user or administrator of suspicious activity if detected any. Facts The operation of this IDS depends on the information collected from the log. It is dependent on Operating system of the machine It can operate even in encrypted environment. 6.2 Network based IDS (NIDS) Network based IDS [10] have sensors which detect the intrusions over the network. NIDS are placed at a strategic point or points within the network to monitor incoming and outgoing traffic of all devices on the network. Facts NIDS is a dedicated hardware or software over network analyzing network traffic The operation depends on the information collected through various sensors. It consists of single purpose sensors. NIDS have a very less impact over the performance of network. It does not have any kind of dependency on Operating System. 7. Related Work There are many different Intrusion Detection Systems that have been suggested time to time. Some of these IDS are discussed as follows: Sebastian Roschke et.al [13] in 2009 proposed an extensible IDS Management architecture in the Cloud. It was proposed to deploy an IDS at each layer of the cloud, so that it could gather all the alerts from all the sensors within the cloud. There were network sensors and host sensors for each layer separately. Then, an IDS Management System was proposed. It consists of: two components: IDS Sensors and IDS Management Unit.IDS Sensors detects and reports suspicious behaviour and thus alerts are generated. These alerts are handled by Event Handler. The alerts generated are stored in the Event Database Storage. The Analysis component represents the gathered events and also analyzes those events. IDS Remote Controller configures and controls the sensors connected to it. The IDS machines can be started, stopped and can also be recovered by the IDS Management System. The limitations of this architecture include: standardization of output from various sensors, inflexibility in the communication between different sensors and management components, and complexity of the architecture LIN Ying et.al [14] in 2010 suggested a Host Based Intrusion Detection System. The detection methods used in it are pattern matching and Back Propagation (BP) Neural Network. The source of information from where required data is extracted is Log File. In Log File Analysis the steps followed are: collection of log file, Pre-decoding of log file, Decoding of log file, Analysis of Log file and Report Events. The technique used to train the Neural Network Set is Back Propagation algorithm. The final results said that 742

the efficiency and accuracy to detect intrusion can be improved by use of HIDS. R. Vanathi et.al [15] in 2012 compared three NIDS: SNORT; TCPDUMP; Network Flight Decoder in cloud environment. SNORT is a lightweight IDS. It has low cost thus having good commercial demand. SNORT uses NIDS mode which is very complex and have manageable configuration. This enables SNORT to analyse network traffic efficiently. The Network Flight Recorder (NFR) makes use of power scripts N-CODE to analyse and then record the network data. It is rated best by the third party. It does not interfere in the network activities. TCPDUMP is another IDS. It captures network packets by use of local interface in promiscuous mode [11]. It can extract particular kind of traffic over network on the basis of header information. It is a well known tool for network debugging. It operates in Sniffer mode. From the comparison between the IDS author finds that SNORT is best NIDS from technical, monetary and administrative point of view. Amir Vahid et.al [16] in 2010 proposed a robust and distributed Intrusion Detection System to detect intrusions in cloud environment. Every subnet of Virtual Machines of model named as Distributed Intrusion Detections using mobile agents (DIDMA) consisted of: IDS Control Centre, Agency, Application Specific Static Agent Detectors, and Specialized Investigative Mobile Agents. The Application Specific Static Agent Detectors are like monitor to Virtual Machine as it detects the events of intrusions detection. The events of intrusion are forwarded to IDS Control Centre. Specialized Investigate Mobile Agent collects evidences of attack. The evidences are collected from VM for auditing and analysis purpose. A Neighbourhood Approach is also used to share the information regarding intrusion over there cloud environment so that preventive measures could be taken. This DIDS results in lowering the network load. The limitation here is that IDS Control Centre cannot add more than six VMs. 8. Comparison of Intrusion Detection Systems The different types of IDS can be used in different ways and for different purposes. Different kinds of IDS have its own positives and negatives. They can be compared on the basis of certain parameters. The parameters taken here are: Analysis, Protection, Versatility, Affordability, Ease of Implementation, Training, and Bandwidth requirement. Analysis refers to the analytic technique used for analyzing attack. Protection describes the circumstances under which the IDS would work or not. Versatility here means ability to work in different situations. Ease of Implementation refers to the level of ease or difficulty with which implementation of IDS can be made. Training is the process of learning skills required to make IDS capable for detection of attacks. Bandwidth requirement describes the amount of bandwidth consumed by IDS in its implementation. The comparative study of different types of Intrusion Detection Systems is given below in the table. The analysis is done on the basis of [17], [18], [19] and [20]. 9. Proposed Idea Cloud Computing provides Infrastructure, hardware, software, and many other resources as a Service. Cloud Computing is based on Virtualization [21]. A cloud may consist of any number of host machines depending upon the requirement of the user. From the comparative study of three kind of IDS i.e. HIDS, NIDS and DIDS it is clear that HIDS can be installed over single host machine for protection from intruders. But when the volume of traffic and the number of host machines within the cloud increases the performance of HIDS lowers. In such a condition NIDS can be implemented within the cloud to save it from the any kind of suspicious activity. Now, the NIDS can keep take care of the network traffic but it cannot give attention to single host as in that case the single host machines become easy victims of intruders. Thus, the proposed idea is to use DIDS in the cloud which is combination of HIDS and NIDS. The DIDS consists of number of sensors installed all over the host machines as well over the crucial points of the network. All sensors are connected to the Central Server. There are some DIDS where sensors can also communicate with each other. The DIDs basically consists of three components: [16] 9.1. DIDS Director The DIDS Director receives the data from Host Monitors and LAN Monitors This data is then analyzed by it for attacks and report is created for the main collector of reports and events. 9.2. LAN Monitor The LAN monitor monitors the network traffic and the suspicious activities are reported to DIDS Director. 9.3. Host Machines It monitors the single host machine. The received data is analyzed and report is given to DIDS Director. 743

Table 1-Comparison between HIDS, NIDS and DIDS Types Of IDS HIDS NIDS DIDS Parameters Analysis Analyzes logs & alerts host machine only Analyzes a network traffic directly Interactive querying of data for analysis using aggregation Protection Protects even when turned off Do not protect when turned off Provides complete protection Versatility Highly Versatile Comparatively less Versatile Least Versatile Affordability Low Cost Average Cost High Cost Ease of Implementation Easy Easy Difficult Training Requires minimum training Requires certain training Requires intense training Bandwidth Requirement No requirement of bandwidth Utilizes LAN bandwidth NIDS components utilizes bandwidth Pros High success rate Real time detection of attacks No requirement of additional hardware Cons Works for single system only Network level threats are not resolved Real time detection Detects attacks remain undetected by HIDS High ownership cost Cannot detect encrypted attacks Works over extensively large network Can be implemented over any type of network Very High Cost Complex implementation 10. Conclusion The Cloud is emerging as the latest trend in the IT world. But there are many issues associated with it too. Security is the most alarming issue of the cloud these days. Various Solutions have been suggested to cope up with these security issues and Intrusion Detection System is one such solution. Intrusion Detection system is a system which monitors the network or single host for any malicious activity and alerts the administrator or the database controller to take necessary action. These IDS can be categorized as HIDS, NIDS, and DIDS. The comparative analysis shows that each type of system have its applicability in different situation. Thus, we can choose an IDS depending upon our need and keeping these parameters in mind. Reference [1] National Institute of Standards and Technology- Computer Security Division- http://crcs.nist.gov/groups/sns/cloud-computing/ [2] Http://www.in.idc.asia/ (accessed in Feb 2013) [3] Top Threats to Cloud Computing, Cloud Security Alliance, http;//www.cloudsecurity alliance.org/csaguide.pdf,v1.0(2010) [4] Amazon Web Services: Overview of Security Processes, Whitepaper, March 2013. pp. 1-48. http://awsmedia.s3.amazonaws.com/pdf/aws_security_whitep aper.pdfscience, 1989. [5] Rohit Bhadauria, Sugata Sanyal, Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques. In International Journal of Computer Applications 47(18): pp 47-66, June 2012. [6] Pengfei You, Yuxing Peng, Weidong Liu, Shoufu Xue, Security Issues and Solutions in Cloud Computing, In 32 nd International Conference on Distributed Computing Systems Workshops, pp. 573-577, IEEE, 2012 [7] Vera Marinova- Boncheva, A Short Survey of Intrusion Detection Systems White paper, PROBLEMS OF ENGINEERING CYBERNETICS AND ROBOTICS, 58, BULGARIAN ACADEMY OF SCIENCES, Sofia, 2007 [8] Http://csrc.nist.gov/publications/history/dod85.pdf (accessed in April 2013) [9] Yassin, M.M.; Awan, A.A., A Host Based IDS Using System Calls. In Networking and Communication Conference,pp. 36-41, IEEE, 2004 [10] Dong Seong Kim, Jong Sou Park, Network Based IDS Using System with Support Vector Machines In International Conference, ICOIN 2003, Cheju Island, Korea,pp..747-756, Feburary 12-13, 2003. [11] Eung Jun Cho, Chong Seon Hong, Deokjic Choi, Distributed IDS for Effiecnt Resource Management in wireless Sensor Networks, In 13 th Asia Pacific Conference on Network Operations and Management Symposium (APNOMS), pp. 1-5, IEEE, 2011 [12]Amirreza Zarrabi, Alireza Zarrabi, Internet Intrusion Detection System Service in a Cloud, In International Journal of Computer Science Issues, Vol 9, Issue 5, No. 2, September 2012 [13] Martuza Ahmed, Rima Pal, Md. Mojammel Hossain, Md. Abu Naser Bikas, Md. Khalad Hasan, A Comparative Study on Currently existing intrusion detection System, In International Association of 744

Computer Science and Information Technolgy- Spring Conference, pp. 151-154, IEEE, 2009 [14] Sebastian Roshke, Feng Cheng, Christoph Meinel, Intrusion Detection in the Cloud. In Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. - 729-734, IEEE, October 2009 [15] LIN Ying, ZHANG You, OU Yang Jia, The Design and Implementation of Host-based Intrusion Detection System, In Third International Symposium on Intelligent Information Technology and Security, pp.-595-598, IEEE, 2010 [16] R. Vanathi, S. Gunasekarn, Comparison of Network Intruson Detection Systems in Cloud Computing Environment, In International Conference on Computer Communication and Informatics (ICCCI-2012), Jan 10-12, Coimbatore, India [17] Amir Vahid Datjerdi, Kamalrulnizam Abu Bakar, Sayed Gholam Hassan Tabatabaei, Distributed Intrusion Detection in Clouds Using Mobile Agents, In Third International Conference on Advanced Engineering Computing and Application in Sciences, pp. 175-180, IEEE, 2009 [18] http://www.combofix.org/what-is-host-based-intrusion-detection.php (accessed in April 2013) [19]http://www.windowsecurity.com/articlestutorials/intrusion_detection/Hids_vs_Nids_Part1.html/ [20] http://www.symantec.com/connect/articles/introduction-distributedintrusion-detection-systems (accessed in april 2013) [21]http://searchservervirtualization.techtarget.com/definition/virtualizatio n (accessed in Feb 2013) 745