Forensic Virtual Machines: Dynamic defence in the Cloud via Introspection

被引:12
|
作者
Shaw, Adrian L. [2 ]
Bordbar, Behzad [1 ]
Saxon, John [1 ]
Harrison, Keith [1 ]
Dalton, Chris I. [2 ]
机构
[1] Univ Birmingham, Sch Comp Sci, Birmingham B15 2TT, W Midlands, England
[2] Hewlett Packard Labs, Bristol BS34 8QZ, Avon, England
关键词
D O I
10.1109/IC2E.2014.59
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Cloud attempts to provide its users with automatically scalable platforms to host many applications and operating systems. To allow for quick deployment, they are often homogenised to a few images, restricting the variations used within the Cloud. An exploitable vulnerability stored within an image means that each instance will suffer from it and as a result, an attacker can be sure of a high pay-off for their time. This makes the Cloud a prime target for malicious activities. There is a clear requirement to develop an automated and computationally-inexpensive method of discovering malicious behaviour as soon as it starts, such that remedial action can be adopted before substantial damage is caused. In this paper we propose the use of Mini-OS, a virtualised operating system that uses minimal resources on the Xen virtualisation platform, for analysing the memory space of other guest virtual machines. These detectors, which we call Forensic Virtual Machines (FVMs), are lightweight such that they are inherently computationally cheap to run. Such a small footprint allows the physical host to run numerous instances to find symptoms of malicious behaviour whilst potentially limiting attack vectors. We describe our experience of developing FVMs and how they can be used to complement existing methods to combat malware. We also evaluate them in terms of performance and the resources that they require.
引用
收藏
页码:303 / 310
页数:8
相关论文
共 50 条
  • [21] Towards virtual machine introspection based security framework for cloud
    Borisaniya, Bhavesh
    Patel, Dhiren
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (02):
  • [22] Performance Analysis of Virtual Machine Introspection Tools in Cloud Environment
    Ainapure, Bharati
    Shah, Deven
    Rao, A. Ananda
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [23] Towards virtual machine introspection based security framework for cloud
    Bhavesh Borisaniya
    Dhiren Patel
    Sādhanā, 2019, 44
  • [24] CryptVMI: A Flexible and Encrypted Virtual Machine Introspection System in the Cloud
    Yao, Fangzhou
    Sprabery, Read
    Campbell, Roy H.
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 11 - 17
  • [25] Forensic Analysis of Cloud Virtual Environments
    Sedighi, Art
    Jacobson, Doug
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 323 - 329
  • [26] Maximizing Cloud Revenue using Dynamic Pricing of Multiple Class Virtual Machines
    Alzhouri, Fadi
    Agarwal, Anjali
    Liu, Yan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (02) : 682 - 695
  • [27] Optimal Dynamic Placement of Virtual Machines in Geographically Distributed Cloud Data Centers
    Teyeb, Hana
    Ben Hadj-Alouane, Nejib
    Tata, Samir
    Balma, Ali
    INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2017, 26 (03)
  • [28] Fuzzy correlational analysis for dynamic consolidation of virtual machines in cloud computing environment
    Bertei, Alex
    Foss, Luciana
    Bedregal, Benjamin
    Reiser, Renata
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 126
  • [29] CloudNet: Dynamic Pooling of Cloud Resources by Live WAN Migration of Virtual Machines
    Wood, Timothy
    Shenoy, Prashant
    Ramakrishnan, K. K.
    Van der Merwe, Jacobus
    ACM SIGPLAN NOTICES, 2011, 46 (07) : 121 - 132
  • [30] CloudNet: Dynamic Pooling of Cloud Resources by Live WAN Migration of Virtual Machines
    Wood, Timothy
    Ramakrishnan, K. K.
    Shenoy, Prashant
    Van der Merwe, Jacobus
    Hwang, Jinho
    Liu, Guyue
    Chaufournier, Lucas
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2015, 23 (05) : 1568 - 1583