The communication in cloud environment takes place through the popular TCP/IP protocol that identifies the different cloud providers over the network through IP addresses. A VM (Virtual machine) in the Internet also has an IP address like a physical computer in the Internet. So, for a malicious user it is not a big deal to find this IP addresses. There is an easy way to implement a malicious virtual machine at