Virtual firewalling for migrating virtual machines in cloud computing

Mahwish Anwar
{"title":"Virtual firewalling for migrating virtual machines in cloud computing","authors":"Mahwish Anwar","doi":"10.1109/ICICT.2013.6732787","DOIUrl":null,"url":null,"abstract":"Cloud Computing (CC) uses virtualization to provide computing resources on demand via Internet. Small and large organizations benefit from CC because of reduced operating costs and increase in business agility. The migrating Virtual Machine (VM) is vulnerable from attacks such as fake migration initiations, service interruptions, manipulation of data or other network attacks. Hence, during live migration any security lax in VM firewall policy can put the VM at risk. A malicious VM can further pose threat to other VMs in its host and consequently for VMs in LAN. Hardware firewalls only protect VM before and after migration. Plus, they are blind to virtual traffic. Hence, virtual firewalls (VFs) are used to secure VMs. Mostly; they are deployed at Virtual Machine Monitor-level (VMM) under Cloud provider's control. Source VMM-Ievel VF provides security to VM before the migration incurs and the destination VMM-level VF starts securing VM after migration is completed. It thus, becomes possible for attacker to use the intermediate migrating window to launch attacks on VM. This research contributes towards providing understanding of having open source virtual firewall at VM-Ievel for migrating VMs to reduce attack window of VM during the migration. The final contribution is the validation and uptime evaluation of the implemented Packet Filter firewall for VM at VM-level during migration in City Network data center. Such an approach would enable hardened security for overall VM migration.","PeriodicalId":212608,"journal":{"name":"2013 5th International Conference on Information and Communication Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Information and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT.2013.6732787","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

Cloud Computing (CC) uses virtualization to provide computing resources on demand via Internet. Small and large organizations benefit from CC because of reduced operating costs and increase in business agility. The migrating Virtual Machine (VM) is vulnerable from attacks such as fake migration initiations, service interruptions, manipulation of data or other network attacks. Hence, during live migration any security lax in VM firewall policy can put the VM at risk. A malicious VM can further pose threat to other VMs in its host and consequently for VMs in LAN. Hardware firewalls only protect VM before and after migration. Plus, they are blind to virtual traffic. Hence, virtual firewalls (VFs) are used to secure VMs. Mostly; they are deployed at Virtual Machine Monitor-level (VMM) under Cloud provider's control. Source VMM-Ievel VF provides security to VM before the migration incurs and the destination VMM-level VF starts securing VM after migration is completed. It thus, becomes possible for attacker to use the intermediate migrating window to launch attacks on VM. This research contributes towards providing understanding of having open source virtual firewall at VM-Ievel for migrating VMs to reduce attack window of VM during the migration. The final contribution is the validation and uptime evaluation of the implemented Packet Filter firewall for VM at VM-level during migration in City Network data center. Such an approach would enable hardened security for overall VM migration.
用于云计算中虚拟机迁移的虚拟防火墙
云计算(CC)利用虚拟化技术,通过Internet按需提供计算资源。小型和大型组织都受益于CC,因为它降低了运营成本并提高了业务敏捷性。迁移虚拟机(VM)容易受到攻击,例如虚假迁移启动、服务中断、数据操纵或其他网络攻击。因此,在实时迁移期间,虚拟机防火墙策略中的任何安全漏洞都可能使虚拟机处于危险之中。恶意虚拟机可以进一步威胁主机内的其他虚拟机,进而威胁局域网内的虚拟机。硬件防火墙只保护迁移前和迁移后的虚拟机。另外,他们对虚拟流量视而不见。因此,使用虚拟防火墙(VFs)来保护虚拟机。主要是;它们部署在云提供商的控制下的虚拟机监视器级别(VMM)。源vmm级VF在迁移前为虚拟机提供安全保护,迁移完成后,目的vmm级VF开始保护虚拟机。因此,攻击者有可能使用中间迁移窗口对VM发起攻击。本研究有助于在迁移虚拟机时提供虚拟机级开源虚拟防火墙的理解,以减少虚拟机在迁移过程中的攻击窗口。最后的贡献是在城市网络数据中心迁移过程中,在VM级对VM实现的包过滤防火墙进行验证和正常运行时间评估。这种方法将为整个VM迁移提供强化的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信