Virtual Machine Introspection

Authors

  • Rachana SC PG Scholar, Dept. of ISE, BMSCE, Bangalore
  • Guruprasad HS Professor and Head, Dept. of CSE, BMSCE, Bangalore

Keywords:

Virtual Machine (VM), Virtual Machine Introspection (VMI), Intrusion Detection System (IDS), Virtual Machine Monitor (VMM), Hypervisor, Infrastructure-as-a-Service (IaaS), Botnet

Abstract

Cloud computing is an Internet-based computing solution which provides the resources in an effective manner. A very serious issue in cloud computing is security which is a major obstacle for the adoption of cloud. The most important threats of cloud computing are Multitenancy, Availability, Loss of control, Loss of Data, outside attacks, DOS attacks, malicious insiders, etc. Among many security issues in cloud, the Virtual Machine Security is one of the very serious issues. Thus, monitoring of virtual machine is essential. The paper proposes a Virtual Network Introspection [VMI] System to secure the Virtual machines from Distributed Denial of Service [DDOS] and Zombie attacks.

References

AkhilBhel, “Emerging Security Challenges in Cloud Computing”, Information and Communication Technologies, 2011 World Congress on, Mumbai, 11th - 14th Dec 2011, pp 217 - 222, Print ISBN: 978-1-4673-0127-5, DOI: 10.1109/WICT.2011.6141247.

FarzadSabahi, ”Cloud Computing Security Threats and Responses”, IEEE 3rd International Conference on Communication software and

Networks(ICCSN), 27-29 May 2011, pp 245-249, Print ISBN: 978-1-61284-485-5, DOI: 10.1109/ICCSN.2011.6014715.

Tal Garfinkel, Mendel Rosenblum, “A Virtual Machine Introspection Based Architecture for Intrusion Detection”, Network and Distributed Systems Security Symposium, 2003, pp 191-206, DOI: 10.1.1.11.8367.

Anthony Roberts, Richard McClatchey, SaadLiaquat, Nigel Edwards, Mike Wray, “Introducing Pathogen: A Real Time Virtual Machine Introspection Framework”, conference on Computer & communications security, New York, NY, USA, November 2013, ISBN: 978-1-4503-2477-9, DOI: 10.1145/2508859.2512518.

AnasAyad, UweDippel, “Agent Based Monitoring Of Virtual Machines”, International Symposium on Information Technology, Kuala

Lumpur, 15-17 June 2010, pp1-6, Print ISBN: 978-1-4244-6715-0, DOI:10.1109/ITSIM.2010.5561375.

Ying Wang, Chunming Hu, Bo Li, “ VMDetector: A VMM-based Platform to Detect Hidden Process by Multi-viewComparison”,IEEE 13th

International Symposium on High-Assurance Systems Engineering, Boca Raton, FL, 10-12 Nov. 2011, pp307-312, Print ISBN:978-1-4673-

-7, DOI: 10.1109/HASE.2011.41.

Li Ruan, JinbinPeng, Limin Xiao, Xiang Wang, “CloudDVMM: Distributed Virtual Machine Monitor for Cloud Computing”, IEEE International Conference on GreenCom and CPSCom, Beijing, 20-23 Aug. 2013, pp 1853-1858, DOI: 10.1109/GreenCom-ThingsCPSCom.2013.344.

Amani S. Ibrahim, James Hamlyn-Harris, John Grundy, Mohamed Almorsy, “CloudSec: A Security Monitoring Appliance for Virtual Machines in the IaaS Cloud Model”, 5th International Conference on Network and System Security, Milan, 6-8 Sept. 2011, pp 113-120,Print

ISBN:978-1-4577-0458-1,DOI:10.1109/ICNSS.2011.6059967.

MiikaKomu, MohitSethi, RamasivakarthikMallavarapu, HeikkiOirola, Rasib Khan, SasuTarkoma, “Secure Networking for Virtual Machines in the Cloud”,IEEE International Conference on Cluster Computing Workshops, 24-28 Sept. 2012, Beijing, pp 88-96, Print ISBN: 978-1-4673-2893-7, DOI 10.1109/ClusterW.2012.29.

SiFan Liu Jie Wu, ZhiHui Lu HuiXiong, “VMRaS: A Novel Virtual Machine Risk Assessment Scheme in the CloudEnvironment”,IEEE 10th International Conference on Services Computing, Santa Clara, CA, June 28-July 3, 2013, pp384-391, Print ISBN: 978-0-7695-5026-8, DOI:10.1109/SCC.2013.12.

Roland Schwarzkopf, Matthias Schmidt, Christian Strack, Simon Martin, Bernd Freisleben, “Increasing virtual machine security in cloud environments”, Journal of Cloud Computing: Advances, Systems and Applications, July 2012, pp 1-12, Online ISSN: 2192-113X, DOI: 10.1186/2192-113X-1-12.

Bryan D. Payne, Martim D. P. de A. Carbone, Wenke Lee, “Secure and Flexible Monitoring of Virtual Machines”, 23rd Annual Computer

Security Applications Conference, 10-14 Dec. 2007, Miami Beach, FL, pp 385-397, Print ISBN:978-0-7695-3060-4, DOI 10.1109/ACSAC.2007.10.

Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, KazumasaOmote, “Introducing Role-based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers”, IEEE Asia-Pacific Services Computing Conference, Yilan, 9-12 Dec. 2008,pp 1225-1230, Print ISBN: 978-0-7695-3473-2/08, DOI: 10.1109/APSCC.2008.14.

Asit More, ShashikalaTapaswi, “Dynamic malware detection and recording using virtual machine introspection”, Best Practices Meet,

Chennai, 12 July 2013, pp 1-6, Print ISBN: 978-1-4799-0637-6, DOI:10.1109/BPM.2013.6615011.

Hanqian Wu, Yi Ding, Chuck Winer, Li Yao, “Network Security for Virtual Machine in Cloud Computing”,5th International Conference on Computer Sciences and Convergence Information Technology, Seoul, Nov. 30 2010-Dec. 2 2010, pp 18-21,Print-ISBN:978-1-4244-8567-

,DOI:10.1109/ICCIT.2010.571102.

Martin Crawford, Gilbert Peterson, “Insider Threat Detection using Virtual Machine Introspection”, 46th Hawaii International Conference on System Sciences,Wailea, HI, USA 7-10 Jan. 2013, pp 1821-1830, Print ISBN: 978-1-4673-5933-7, DOI: 0.1109/HICSS.2013.278.

Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, KazumasaOmote, “Introducing Role-based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers”, IEEE Asia-Pacific Services Computing Conference,Yilan, 9-12 Dec. 2008,pp 1225-1230, Print ISBN: 978-0-7695-3473-2/08, DOI: 10.1109/APSCC.2008.14.

BingyuZou, Huanguo Zhang, “Integrity Protection and Attestation of Security Critical Executions on Virtualized Platform in Cloud Computing Environment”, IEEE International Conference on GreenCom and CPSCom, Beijing, 20-23 Aug. 2013, pp 2071-2075, DOI:10.1109/GreenCom-iThingsCPSCom.2013.388.

Kenichi Kourai, Takeshi Azumi, Shigeru Chiba, “A Self-protection Mechanism against Steppingstone Attacks for IaaS Clouds”, 9th nternational Conference on Ubiquitous Intelligence and Computing/Autonomic and Trusted Computing, Fukuoka, 4-7 Sept. 2012, pp 539-546, Print ISBN: 978-1-4673-3084-8, DOI: 10.1109/UICATC.2012.139.

Paul A. Karger, “Is Your Virtual Machine Monitor Secure?” , Third Asia-Pacific Trusted Infrastructure Technologies Conference, Hubei,

-17 Oct. 2008, pp 5, Print ISBN:978-0-7695-3363-6, DOI:10.1109/APTC.2008.18.

Sylvie Laniepce, Marc Lacoste, Mohammed Kassi-Lahlou, Fabien Bignon, KahinaLazri, AurelienWailly, “Engineering Intrusion Prevention Services for IaaS Clouds: The Way of the Hypervisor”, IEEE International Symposium On Service Oriented System Engineering, Redwood City, 25-28 March 2013, pp 25-36, Print ISBN:978-1-4673-5659-6, DOI:10.1109/SOSE.2013.27.

Shun-Wen Hsiaoy, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen, “A Cooperative Botnet Profiling and Detection in Virtualized Environment”, IEEE Conference on Communication and Network Security, National Harbor, MD, 14-16 Oct. 2013, pp 154-162, DOI: 10.1109/CNS.2013.6682703.

Kara Nance and Brian Hay, Matt Bishop, “Investigating the Implications of Virtual Machine Introspection for Digital Forensics”, International Conference on Availability, Reliability and Security, Fukuoka, 16-19 March 2009, pp 1024-1029, Print ISBN: 978-1-4244-3572-2, DOI:10.1109/ARES.2009.173.

FabrizioBaiardi, Daniele Sgandurra, “Building Trustworthy Intrusion Detection through VM Introspection”, Third International Symposium on Information Assurance and Security, Manchester, 29-31 Aug. 2007, pp 209-214, Print ISBN: 0-7695-2876-7, DOI: 10.1109/IAS.2007.36.

Bryan D. Payne, Martim Carbone, Monirul Sharif, Wenke Lee, “Lares: An Architecture for Secure Active Monitoring Using Virtualization”, IEEE Symposium on Security and Privacy, 2008, Washington, DC, USA, pp 233-247, ISBN: 978-0-7695-3168-7, DOI:10.1109/SP.2008.24.

Downloads

Published

2024-02-26

How to Cite

Rachana, S. C., & Guruprasad, H. S. (2024). Virtual Machine Introspection. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(06), 860–867. Retrieved from https://ijact.in/index.php/j/article/view/153

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.