Virtualization Based Security Framework (vBASE)
نویسندگان
چکیده
In general, computer security aims at providing confidentiality, integrity and availability to computing systems. Traditionally, researchers in the fields of computer security have used software and hardware mechanisms for implementing security in computing systems. Software only security approaches typically deal with application level and Operating System (OS) level security mechanisms. Though, softwareonly mechanisms are easy to implement and patch, they suffer from heavy false-positives and false-negatives, thus making them vulnerable to software attacks and untrustworthy. Hardware security solutions, such as ABYSS [10], AEGIS [9], Arc3D [5], Hide [12] and XOM [13], on the contrary, involve changes to the micro-architecture (typically adding new instruction sets, privilege levels etc.). These modified secure architectures deploy hardware mechanisms like memory encryption to provide confidentiality and memory authentication to ensure the integrity of the applications. However, adopting these secure architectures involves changes to the micro-architecture. Also, since the fabrication cycle is long (usually 5 years), testing these architectures is a time consuming process and therefore adopting these architectures as a security solution becomes infeasible. Virtualization Technology introduces a software abstraction layer or virtualization layer (virtualization software) between the hardware and the operating system. This software abstraction layer is known as a Virtual Machine Monitor (VMM) [2] or the hypervisor. Virtualization has the power to emulate any required hardware features and project it to the OS. This feature of virtualization makes it much easier to incorporate security mechanisms within the virtualization layer. Also virtualization is supported by almost all the hardware vendors. Thus the security of the system can be increased without incurring excessive costs and performance overheads. Hence with this motivation, we propose a virtualization based security framework (vBASE).
منابع مشابه
Towards a secured network virtualization
Network virtualization promises to fulfill the demand for an agile Internet that is friendly to technological innovation. In the past, tremendous effort s have been dedicated to studying the fundamental problem in network virtualization, namely Virtual Network Embedding (VNE). However, until recently, very limited work has addressed the security issues and implications of VNE or network virtual...
متن کاملVirtualization Based Secure Execution and Testing Framework
Computer security aims at protecting confidentiality, integrity, and availability of sensitive information that are processed, used, or stored by computing systems. Computer scientists working in the field of computer security have successfully designed and developed software and hardware mechanisms to provide security in modern day computing devices. As compared to hardware security mechanisms...
متن کاملSecPod: a Framework for Virtualization-based Security Systems
The OS kernel is critical to the security of a computer system. Many systems have been proposed to improve its security. A fundamental weakness of those systems is that page tables, the data structures that control the memory protection, are not isolated from the vulnerable kernel, and thus subject to tampering. To address that, researchers have relied on virtualization for reliable kernel memo...
متن کاملHypervisor- vs. Container-based Virtualization
For a long time, the term virtualization implied talking about hypervisor-based virtualization. However, in the past few years container-based virtualization got mature and especially Docker gained a lot of attention. Hypervisor-based virtualization provides strong isolation of a complete operating system whereas container-based virtualization strives to isolate processes from other processes a...
متن کاملA Framework for Managing User-defined Security Policies to Support Network Security Functions
Network Functions Virtualization (NFV) and Software Defined Networking (SDN) make it easier for security administrators to manage security policies on a network system. However, it is still challenging to map high-level security policies defined by users into low-level security policies that can be applied to network security devices. To address this problem, we introduce a framework for effect...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011