Detecting anomalies in IaaS environments through virtual machine host system call analysis

London(2012)

引用 44|浏览3
暂无评分
摘要
Providers and consumers of Infrastructure-as-a-Service (IaaS) virtual machine resources may be the subject of a number of attacks, particularly in public cloud environments. Detecting anomalies is hence critical both to protect against misuse and attacks, but is subject to constraints. These include primarily efficiency, but also legal and contractual restrictions limiting the depth of intrusiveness, which can be achieved by an intrusion detection system. In many cases, the IaaS provider will also have very limited insights into the actual workloads used by clients. In this paper we therefore propose to monitor system calls at the VM host level without requiring any instrumentation within VMs and argue that this level of granularity is sufficient to capture a number of relevant attack classes. This, together with the efficiency and efficacy of the approach is shown through experiments and statistical analysis in a Linux KVM-based reference scenario. The proposed system, unlike other systems such as VM Introspection (VMI), does not require any knowledge about VMs from inside nor requiring any OS or hypervisor modifications.
更多
查看译文
关键词
Linux,cloud computing,security of data,virtual machines,IaaS environments,Infrastructure-as-a-Service,Linux KVM-based reference,VM introspection,VMI,detecting anomalies,hypervisor modifications,intrusion detection system,public cloud environments,virtual machine host system call analysis,Cloud Computing Security,Host-Based Anomaly Detection,IDS,IaaS Security,System Calls Monitoring,Virtual Machine Monitoring
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要