Forensic Virtual Machines: Dynamic defence in the Cloud via Introspection

被引:12
|
作者
Shaw, Adrian L. [2 ]
Bordbar, Behzad [1 ]
Saxon, John [1 ]
Harrison, Keith [1 ]
Dalton, Chris I. [2 ]
机构
[1] Univ Birmingham, Sch Comp Sci, Birmingham B15 2TT, W Midlands, England
[2] Hewlett Packard Labs, Bristol BS34 8QZ, Avon, England
关键词
D O I
10.1109/IC2E.2014.59
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Cloud attempts to provide its users with automatically scalable platforms to host many applications and operating systems. To allow for quick deployment, they are often homogenised to a few images, restricting the variations used within the Cloud. An exploitable vulnerability stored within an image means that each instance will suffer from it and as a result, an attacker can be sure of a high pay-off for their time. This makes the Cloud a prime target for malicious activities. There is a clear requirement to develop an automated and computationally-inexpensive method of discovering malicious behaviour as soon as it starts, such that remedial action can be adopted before substantial damage is caused. In this paper we propose the use of Mini-OS, a virtualised operating system that uses minimal resources on the Xen virtualisation platform, for analysing the memory space of other guest virtual machines. These detectors, which we call Forensic Virtual Machines (FVMs), are lightweight such that they are inherently computationally cheap to run. Such a small footprint allows the physical host to run numerous instances to find symptoms of malicious behaviour whilst potentially limiting attack vectors. We describe our experience of developing FVMs and how they can be used to complement existing methods to combat malware. We also evaluate them in terms of performance and the resources that they require.
引用
收藏
页码:303 / 310
页数:8
相关论文
共 50 条
  • [41] Dynamic Placement of Virtual Machines with Both Deterministic and Stochastic Demands for Green Cloud Computing
    Yue, Wenying
    Chen, Qiushuang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [42] BGM-BLA: A New Algorithm for Dynamic Migration of Virtual Machines in Cloud Computing
    Tao, Fei
    Li, Chen
    Liao, T. Warren
    Laili, Yuanjun
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2016, 9 (06) : 910 - 925
  • [43] Dynamic deployment of virtual machines in cloud computing using multi-objective optimization
    Bo Xu
    Zhiping Peng
    Fangxiong Xiao
    Antonio Marcel Gates
    Jian-Ping Yu
    Soft Computing, 2015, 19 : 2265 - 2273
  • [44] Dynamic virtual machines placement in a cloud environment by multi-objective programming approaches
    Kao, Han-Ying
    Yang, Yu-Min
    Huang, Chia-Hui
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATICS AND BIOMEDICAL SCIENCES (ICIIBMS), 2015, : 364 - 365
  • [45] Improving cloud computing virtual machines balancing through hosts and virtual machines similarities
    Brascher, Gabriel Beims
    Weingartner, Rafael
    Westphall, Carlos Becker
    2017 13TH IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2017, : 76 - 85
  • [46] HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code
    Xiao, Jidong
    Lu, Lei
    Wang, Haining
    Zhu, Xiaoyun
    2016 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC), 2016, : 127 - 136
  • [47] Vulnerability Assessment for Virtual Machines in Virtual Environment of Cloud Computing
    Patil, Rajendra
    Modi, Chirag
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 569 - 576
  • [48] Endpoint Configuration Compliance Monitoring via Virtual Machine Introspection
    Kienzle, Darrell
    Persaud, Ryan
    Elder, Matthew
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 926 - 935
  • [49] Live Migration of Virtual Machines in the Homogeneous Cloud
    Mohandas, Maya
    Babu, K. R. Remesh
    IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGICAL TRENDS IN COMPUTING, COMMUNICATIONS AND ELECTRICAL ENGINEERING (ICETT), 2016,
  • [50] Online Allocation of Virtual Machines in a Distributed Cloud
    Hao, Fang
    Kodialam, Murali
    Lakshman, T. V.
    Mukherjee, Sarit
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (01) : 238 - 249