The next generation of cloud security through hypervisor-based virtual machine introspection

Fazalur Rehman, Z. Muhammad, S. Asif, Hameedur Rahman
{"title":"The next generation of cloud security through hypervisor-based virtual machine introspection","authors":"Fazalur Rehman, Z. Muhammad, S. Asif, Hameedur Rahman","doi":"10.1109/ICAI58407.2023.10136655","DOIUrl":null,"url":null,"abstract":"Cloud computing has become increasingly prevalent in recent years, providing organizations with on-demand re-sources. While cloud infrastructure has matured with security en-hancements, attackers' strategies for launching attacks on cloud networks are also becoming more sophisticated, posing a risk to the system's confidentiality, integrity, and availability. Virtualization is a key aspect of cloud computing, which allows physical computers to share their resources and computing power. To secure cloud infrastructure, multiple defensive measures are used such as virtual level segregation, intrusion detection prevention systems (IDS/IPS), cloud access and security brokers (CASB), and endpoint detection & response. These safeguards are often run on the virtual machine shared across a common network, making them vulnerable to deceivability, insider threat, and network-level attacks. Previous research has primarily relied on the traditional approaches discussed, with limited compliance with hypervisor-based introspection. In this paper, we propose a novel hypervisor-based virtual machine introspection (HVMI) tool to detect and perform runtime forensic analysis of attacks on the cloud platform. The proposed solution consists of a client application that runs on a host of the cloud provider. In case of any security breach, the HVMI notifies the cloud provider and starts forensic analysis to detect and minimize the impact of the breach. Additionally, HVMI uses structured threat information expression (STIX) to generate standard threat details that are easy to understand and widely adopted by cyber professionals. STIX patterns may also be made publicly available, allowing security organizations to deduce defensive strategies against certain types of cyberattacks that occur in the cloud.","PeriodicalId":161809,"journal":{"name":"2023 3rd International Conference on Artificial Intelligence (ICAI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Artificial Intelligence (ICAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAI58407.2023.10136655","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Cloud computing has become increasingly prevalent in recent years, providing organizations with on-demand re-sources. While cloud infrastructure has matured with security en-hancements, attackers' strategies for launching attacks on cloud networks are also becoming more sophisticated, posing a risk to the system's confidentiality, integrity, and availability. Virtualization is a key aspect of cloud computing, which allows physical computers to share their resources and computing power. To secure cloud infrastructure, multiple defensive measures are used such as virtual level segregation, intrusion detection prevention systems (IDS/IPS), cloud access and security brokers (CASB), and endpoint detection & response. These safeguards are often run on the virtual machine shared across a common network, making them vulnerable to deceivability, insider threat, and network-level attacks. Previous research has primarily relied on the traditional approaches discussed, with limited compliance with hypervisor-based introspection. In this paper, we propose a novel hypervisor-based virtual machine introspection (HVMI) tool to detect and perform runtime forensic analysis of attacks on the cloud platform. The proposed solution consists of a client application that runs on a host of the cloud provider. In case of any security breach, the HVMI notifies the cloud provider and starts forensic analysis to detect and minimize the impact of the breach. Additionally, HVMI uses structured threat information expression (STIX) to generate standard threat details that are easy to understand and widely adopted by cyber professionals. STIX patterns may also be made publicly available, allowing security organizations to deduce defensive strategies against certain types of cyberattacks that occur in the cloud.
下一代云安全通过基于管理程序的虚拟机自省实现
云计算近年来变得越来越流行,为组织提供按需资源。虽然云基础设施已经成熟,安全性也得到了增强,但攻击者在云网络上发起攻击的策略也变得越来越复杂,这对系统的机密性、完整性和可用性构成了风险。虚拟化是云计算的一个关键方面,它允许物理计算机共享它们的资源和计算能力。为了保护云基础设施,使用了多种防御措施,如虚拟层隔离、入侵检测防御系统(IDS/IPS)、云访问和安全代理(CASB)以及端点检测和响应。这些保护措施通常在跨公共网络共享的虚拟机上运行,使它们容易受到欺骗、内部威胁和网络级攻击。以前的研究主要依赖于所讨论的传统方法,对基于管理程序的内省的遵从性有限。在本文中,我们提出了一种新的基于管理程序的虚拟机自省(HVMI)工具,用于检测和执行云平台上的攻击的运行时取证分析。建议的解决方案包括在云提供商的主机上运行的客户端应用程序。如果出现任何安全漏洞,HVMI将通知云提供商,并开始取证分析,以检测并最小化漏洞的影响。此外,HVMI使用结构化威胁信息表达(STIX)来生成易于理解并被网络专业人员广泛采用的标准威胁细节。STIX模式也可以公开提供,允许安全组织推断出针对发生在云中的某些类型的网络攻击的防御策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信