Protecting Xen hypercalls Intrusion Detection/ Prevention in a Virtualization Environment
نویسنده
چکیده
During the past few years virtualization has strongly reemerged from the shadow of the mainframe generation as a promising technology for the new generation of computers. Both the research and industry communities have recently looked at virtualization as a solution for security and reliability. With the increased usage and dependence on this technology, security issues of virtualization are becoming more and more relevant. This thesis looks at the challenge of securing Xen, a popular open source virtualization technology. We analyze security properties of the Xen architecture, propose and implement different security schemes including authenticated hypercalls, hypercall access table and hypercall stack trace verification to secure Xen hypercalls (which are analogous to system calls in the OS world). The security analysis shows that hypercall attacks could be a real threat to the Xen virtualization architecture (i.e., hypercalls could be exploited to inject malicious code into the virtual machine monitor (VMM) by a compromised guest OS), and effective hypercall protection measures can prevent this threat. The initial performance analysis shows that our security measures are efficient in terms of execution time and space.
منابع مشابه
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملDevelopment of an Intrusion Detection and Prevention Course Project Using Virtualization Technology
This paper discusses a project used in a graduate course on intrusion detection and incidents response at East Carolina University. By using virtual machine technology, a virtual network infrastructure was designed for students to simulate the real word attacks in a restricted environment. The project provided students with strong theoretical knowledge and practical experience in the field of i...
متن کاملProvable Security Under_docx
Virtualization is the mechanism that provides users a way to use many Operating Systems (OS) without need to reboot the system to shift one to another. If an adversary compromises any guest then virtual monitor (XEN in this context) has no reject any request from that OS. There is no formal proof that this virtual monitor provides security from them. We use virtualized system infrastructure of ...
متن کاملEvaluating Xen, VMware, and OpenVZ Virtualization Platforms for Network Virtualization
Network virtualization is a technique that allows having multiple concurrent isolated networks sharing physical network resources. This work analyzes the main available virtualization platforms, Xen, OpenVZ, and VMware, for network virtualization. We compare their virtualization techniques, achieved performance in virtualizing computational resources and appropriateness for usage in a virtual n...
متن کاملExperimental assessment of network design approaches for protecting industrial control systems
This paper surveys and provides experimental results related to network design techniques focused on enhancing the security of industrial control systems. It analyzes defensein-depth strategies, network segmentation, network firewall configurations and the role of intrusion prevention systems, intrusion detection systems and anomaly detection systems. The paper also studies the applicability of...
متن کامل