SECURING THE VIRTUAL MACHINES S C Rachana 1 , Dr. H S Guruprasad 2 1 PG Scholar, Dept. of ISE, BMSCE, Bangalore, 2 Professor and Head, Dept. of ISE, BMSCE, Bangalore, [email protected]Abstract Cloud Computing provides the computer resources in an effective manner. Security in cloud is one of the major drawbacks. Among many security issues in cloud, the Virtual Machine Security is one of the very serious issues.Thus, monitoring of virtual machine is essential. The survey includes various existing Virtual Machine security problems and also many different architectural solutions to overcome them. Keywords: Virtual Machine [VM], Introspection, Virtual Network Introspection [VMI], Intrusion Detection System [IDS], Virtual Machine Monitor [VMM], Hypervisor, Infrastructure-as-a- Service [IaaS], Botnet. Introduction A virtual machine mimics the physical machine as software. Many operating systems and softwares can be installed in virtual machine. Virtual machines are accompanied with the virtualization layer called hypervisor which runs on client or server operating system. Virtual machine attacks include VM-to-VM attacks, Denial-Of-Service attacks, Isolation breakage, Remote management vulnerabilities etc. Thus, virtual machine monitors are used to monitor the virtual machines. The existing popular virtual machine monitors are Xen, VMware ESX Server etc. Chris Benningeret. al. [4]introduces Virtual Machine Introspection [VMI] and explains the related work with an example. A light weight VMI called Maitland is proposed which is a virtualization based tool. The architecture of Maitland is given with its detailed explanation along with its functions. The VMI Maitland is experimented under various scenarios to evaluate its performance.Rolandet. al. [11] gives a brief description on the Virtual Machine security. An approach is proposed for checking software and scanning of Virtual Machines for known security attacks. The proposed approach involves two components such as Update Checker and Online Penetration Scheme [OPS]. The design of both the components is given. These two components are implemented and experimented for evaluation.Anaset. al. [16] describes two ways to implement Virtual Machine Introspection (VMI) tools and techniques. A proposed system is implemented using one of the two ways and its system design is given. The system involves Log File, ZFS File System, Backup Spooler, Virtual Machine recovery etc. The system is tested for its behavior.Ying Wanget. al. [20] gives the importance of Virtual Machine [VM] Detector along with some related work. A VM Detector design is proposed to detect hidden process by multi-view comparision and its goals are mentioned. A VM Detector is used to obtain views of kernel level, Virtual Machine Monitor [VMM] level and also detects hidden suspicious S C Rachana et al, Int.J.Computer Technology & Applications,Vol 5 (3),1012-1019 IJCTA | May-June 2014 Available [email protected]1012 ISSN:2229-6093
8
Embed
SECURING THE VIRTUAL MACHINES - IJCTA · SECURING THE VIRTUAL MACHINES . S C Rachana. 1, Dr. H S Guruprasad. 2. 1. PG Scholar, Dept. of ISE, BMSCE, Bangalore, 2 . Professor and Head,
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
SECURING THE VIRTUAL MACHINES
S C Rachana1, Dr. H S Guruprasad
2
1 PG Scholar, Dept. of ISE, BMSCE, Bangalore,
2 Professor and Head, Dept. of ISE, BMSCE, Bangalore, [email protected]
Abstract
Cloud Computing provides the computer
resources in an effective manner. Security in
cloud is one of the major drawbacks. Among
many security issues in cloud, the Virtual
Machine Security is one of the very serious
issues.Thus, monitoring of virtual machine is
essential. The survey includes various existing
Virtual Machine security problems and also many
different architectural solutions to overcome
them.
Keywords: Virtual Machine [VM], Introspection,
Virtual Network Introspection [VMI], Intrusion
Detection System [IDS], Virtual Machine
Monitor [VMM], Hypervisor, Infrastructure-as-a-
Service [IaaS], Botnet.
Introduction
A virtual machine mimics the physical
machine as software. Many operating systems and
softwares can be installed in virtual machine.
Virtual machines are accompanied with the
virtualization layer called hypervisor which runs
on client or server operating system. Virtual
machine attacks include VM-to-VM attacks,
Denial-Of-Service attacks, Isolation breakage,
Remote management vulnerabilities etc. Thus,
virtual machine monitors are used to monitor the
virtual machines. The existing popular virtual
machine monitors are Xen, VMware ESX Server
etc.
Chris Benningeret. al. [4]introduces Virtual
Machine Introspection [VMI] and explains the
related work with an example. A light weight
VMI called Maitland is proposed which is a
virtualization based tool. The architecture of
Maitland is given with its detailed explanation
along with its functions. The VMI Maitland is
experimented under various scenarios to evaluate
its performance.Rolandet. al. [11] gives a brief
description on the Virtual Machine security. An
approach is proposed for checking software and
scanning of Virtual Machines for known security
attacks. The proposed approach involves two
components such as Update Checker and Online
Penetration Scheme [OPS]. The design of both
the components is given. These two components
are implemented and experimented for
evaluation.Anaset. al. [16] describes two ways to
implement Virtual Machine Introspection (VMI)
tools and techniques. A proposed system is
implemented using one of the two ways and its
system design is given. The system involves Log
File, ZFS File System, Backup Spooler, Virtual
Machine recovery etc. The system is tested for its
behavior.Ying Wanget. al. [20] gives the
importance of Virtual Machine [VM] Detector
along with some related work. A VM Detector
design is proposed to detect hidden process by
multi-view comparision and its goals are
mentioned. A VM Detector is used to obtain
views of kernel level, Virtual Machine Monitor
[VMM] level and also detects hidden suspicious
S C Rachana et al, Int.J.Computer Technology & Applications,Vol 5 (3),1012-1019