vProVal: Introspection based Process Validation for Detecting Malware in KVM-based Cloud Environment

P. Mishra, Ishita Verma, Saurabh Gupta, Varun S. Rana, Kavitha Kadarla
{"title":"vProVal: Introspection based Process Validation for Detecting Malware in KVM-based Cloud Environment","authors":"P. Mishra, Ishita Verma, Saurabh Gupta, Varun S. Rana, Kavitha Kadarla","doi":"10.1109/FMEC.2019.8795365","DOIUrl":null,"url":null,"abstract":"In the modern era of computing, Cloud security is of paramount importance. Most of the research mainly focused on In-Virtual Machine (VM) security techniques for detecting malware affecting virtual domains running in the Cloud. In-VM security techniques are deployed inside the VM and hence they are very much prone to subversion attacks. In this paper, an-VM monitoring approach based on introspection, called vProVal, is proposed. The vProVal is designed to detect the hidden processes and rootkits that disable the security tool, running in the monitored VM in Kernel VM (KVM)-based cloud environment. It performs the malware detection from outside the VM at the KVM-layer and hence more robust to attacks. The introspection technique used is to extract the low-level details of a running VM from hypervisor by viewing its memory, trapping on hardware events, and accessing the vCPU registers. A preliminary analysis has been performed and the approach is found to be promising.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FMEC.2019.8795365","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

In the modern era of computing, Cloud security is of paramount importance. Most of the research mainly focused on In-Virtual Machine (VM) security techniques for detecting malware affecting virtual domains running in the Cloud. In-VM security techniques are deployed inside the VM and hence they are very much prone to subversion attacks. In this paper, an-VM monitoring approach based on introspection, called vProVal, is proposed. The vProVal is designed to detect the hidden processes and rootkits that disable the security tool, running in the monitored VM in Kernel VM (KVM)-based cloud environment. It performs the malware detection from outside the VM at the KVM-layer and hence more robust to attacks. The introspection technique used is to extract the low-level details of a running VM from hypervisor by viewing its memory, trapping on hardware events, and accessing the vCPU registers. A preliminary analysis has been performed and the approach is found to be promising.
vProVal:基于自省的进程验证在基于kvm的云环境中检测恶意软件
在现代计算时代,云安全至关重要。大多数研究主要集中在检测影响云中运行的虚拟域的恶意软件的虚拟机(VM)安全技术上。虚拟机内安全技术部署在虚拟机内部,因此它们非常容易受到颠覆攻击。本文提出了一种基于内省的虚拟机监控方法,称为vProVal。vProVal用于检测在基于KVM的云环境中,被监控的虚拟机中运行的隐藏进程和禁用安全工具的rootkit。它在kvm层执行来自VM外部的恶意软件检测,因此对攻击更加健壮。所使用的内省技术是通过查看虚拟机管理程序的内存、捕获硬件事件和访问vCPU寄存器,从虚拟机管理程序中提取正在运行的虚拟机的低级细节。初步分析表明,该方法是可行的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信