Protecting Xen hypercalls Intrusion Detection/ Prevention in a Virtualization Environment

نویسنده

  • Cuong Hoang H. Le
چکیده

During the past few years virtualization has strongly reemerged from the shadow of the mainframe generation as a promising technology for the new generation of computers. Both the research and industry communities have recently looked at virtualization as a solution for security and reliability. With the increased usage and dependence on this technology, security issues of virtualization are becoming more and more relevant. This thesis looks at the challenge of securing Xen, a popular open source virtualization technology. We analyze security properties of the Xen architecture, propose and implement different security schemes including authenticated hypercalls, hypercall access table and hypercall stack trace verification to secure Xen hypercalls (which are analogous to system calls in the OS world). The security analysis shows that hypercall attacks could be a real threat to the Xen virtualization architecture (i.e., hypercalls could be exploited to inject malicious code into the virtual machine monitor (VMM) by a compromised guest OS), and effective hypercall protection measures can prevent this threat. The initial performance analysis shows that our security measures are efficient in terms of execution time and space.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Development of an Intrusion Detection and Prevention Course Project Using Virtualization Technology

This paper discusses a project used in a graduate course on intrusion detection and incidents response at East Carolina University. By using virtual machine technology, a virtual network infrastructure was designed for students to simulate the real word attacks in a restricted environment. The project provided students with strong theoretical knowledge and practical experience in the field of i...

متن کامل

Provable Security Under_docx

Virtualization is the mechanism that provides users a way to use many Operating Systems (OS) without need to reboot the system to shift one to another. If an adversary compromises any guest then virtual monitor (XEN in this context) has no reject any request from that OS. There is no formal proof that this virtual monitor provides security from them. We use virtualized system infrastructure of ...

متن کامل

Evaluating Xen, VMware, and OpenVZ Virtualization Platforms for Network Virtualization

Network virtualization is a technique that allows having multiple concurrent isolated networks sharing physical network resources. This work analyzes the main available virtualization platforms, Xen, OpenVZ, and VMware, for network virtualization. We compare their virtualization techniques, achieved performance in virtualizing computational resources and appropriateness for usage in a virtual n...

متن کامل

Experimental assessment of network design approaches for protecting industrial control systems

This paper surveys and provides experimental results related to network design techniques focused on enhancing the security of industrial control systems. It analyzes defensein-depth strategies, network segmentation, network firewall configurations and the role of intrusion prevention systems, intrusion detection systems and anomaly detection systems. The paper also studies the applicability of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009