Virtual Machine Introspection in Virtualization: A Security Perspective

D. Kapil, P. Mishra
{"title":"Virtual Machine Introspection in Virtualization: A Security Perspective","authors":"D. Kapil, P. Mishra","doi":"10.1145/3474124.3474140","DOIUrl":null,"url":null,"abstract":"Virtualization technology has gained enough attention in several fields such as Cloud Computing, the Internet of Things (IoT), and software defined networking (SDN), etc. However, security issues in virtualization impose several questions on the adoption of this technology and raise strong security concerns. Most of the researchers have employed traditional security approaches in virtualization. However, these approaches are not effective enough for the modern environment. Instead, Introspection-based approaches such as Virtual Machine Introspection (VMI) are more useful to protect the virtualized environment. VMI approaches provide robust solutions in identifying the user and kernel-level processes-based attacks by positioning the security tool outside the VM. The successful implementation of these solutions is still challenging due to having heterogeneous design architectures of hypervisors. In this paper, a comprehensive study of VMI approaches is provided with the perspective of facilitating secure attack detection solutions in the virtualization environment. Various open research challenges are identified and discussed in detail. A brief discussion on the various VMI libraries is provided to give some practical insights to readers. We hope that our work will motivate researchers to work in this direction more actively.","PeriodicalId":144611,"journal":{"name":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3474124.3474140","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Virtualization technology has gained enough attention in several fields such as Cloud Computing, the Internet of Things (IoT), and software defined networking (SDN), etc. However, security issues in virtualization impose several questions on the adoption of this technology and raise strong security concerns. Most of the researchers have employed traditional security approaches in virtualization. However, these approaches are not effective enough for the modern environment. Instead, Introspection-based approaches such as Virtual Machine Introspection (VMI) are more useful to protect the virtualized environment. VMI approaches provide robust solutions in identifying the user and kernel-level processes-based attacks by positioning the security tool outside the VM. The successful implementation of these solutions is still challenging due to having heterogeneous design architectures of hypervisors. In this paper, a comprehensive study of VMI approaches is provided with the perspective of facilitating secure attack detection solutions in the virtualization environment. Various open research challenges are identified and discussed in detail. A brief discussion on the various VMI libraries is provided to give some practical insights to readers. We hope that our work will motivate researchers to work in this direction more actively.
虚拟化中的虚拟机自省:安全视角
虚拟化技术在云计算、物联网(IoT)、软件定义网络(SDN)等多个领域得到了足够的重视。然而,虚拟化中的安全问题给采用该技术带来了几个问题,并引起了强烈的安全问题。大多数研究人员在虚拟化中使用传统的安全方法。然而,这些方法对于现代环境来说是不够有效的。相反,基于自省的方法,如虚拟机自省(Virtual Machine Introspection, VMI)对于保护虚拟化环境更有用。VMI方法通过将安全工具定位在VM之外,为识别基于用户和内核级进程的攻击提供了健壮的解决方案。由于管理程序的设计架构异构,这些解决方案的成功实现仍然具有挑战性。本文从促进虚拟化环境中安全攻击检测解决方案的角度,对VMI方法进行了全面的研究。各种开放的研究挑战被确定和详细讨论。本文简要讨论了各种VMI库,以便为读者提供一些实用的见解。我们希望我们的工作将激励研究人员更积极地朝这个方向努力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信