云计算中使用网络时间戳的虚拟机远程检测方法

M. Noorafiza, H. Maeda, T. Kinoshita, R. Uda
{"title":"云计算中使用网络时间戳的虚拟机远程检测方法","authors":"M. Noorafiza, H. Maeda, T. Kinoshita, R. Uda","doi":"10.1109/ICITST.2013.6750225","DOIUrl":null,"url":null,"abstract":"As any new technology advancement, cloud computing also creates disruptive possibilities and security risk potentials. Virtualization which are the engine that drives cloud computing turns the data center into self-managing, highly scalable, highly available and pools of easily consumable resources. The increase in virtualization and usage of virtual machines (VM) in cloud computing environment has attracted a lot of attention from the computer security research community on the potential treats that could occurs from vast use of virtual machines in cloud computing. In this paper, methods for detecting VM using remote IP and ICMP packet timestamp detection methods and the timestamp behavior are studied, tested and investigated to determine either the problem still exist in high performance cloud computing infrastructure. The results from this study shows that there were distinguishable differences in the timestamp replies behaviors received from VM and non-VM machines even in a high performance private cloud computing environment. These results prove a significant potential that timestamp detection method could be exploited by malware as a VM detection method even in high performance cloud computing infrastructure. From the finding of this study, we proposed theory for the stand-alone environment to reply timestamp in such differences similar to the VM.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Virtual machine remote detection method using network timestamp in cloud computing\",\"authors\":\"M. Noorafiza, H. Maeda, T. Kinoshita, R. Uda\",\"doi\":\"10.1109/ICITST.2013.6750225\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As any new technology advancement, cloud computing also creates disruptive possibilities and security risk potentials. Virtualization which are the engine that drives cloud computing turns the data center into self-managing, highly scalable, highly available and pools of easily consumable resources. The increase in virtualization and usage of virtual machines (VM) in cloud computing environment has attracted a lot of attention from the computer security research community on the potential treats that could occurs from vast use of virtual machines in cloud computing. In this paper, methods for detecting VM using remote IP and ICMP packet timestamp detection methods and the timestamp behavior are studied, tested and investigated to determine either the problem still exist in high performance cloud computing infrastructure. The results from this study shows that there were distinguishable differences in the timestamp replies behaviors received from VM and non-VM machines even in a high performance private cloud computing environment. These results prove a significant potential that timestamp detection method could be exploited by malware as a VM detection method even in high performance cloud computing infrastructure. From the finding of this study, we proposed theory for the stand-alone environment to reply timestamp in such differences similar to the VM.\",\"PeriodicalId\":246884,\"journal\":{\"name\":\"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITST.2013.6750225\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2013.6750225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

随着任何新技术的进步,云计算也带来了颠覆性的可能性和安全风险。虚拟化是驱动云计算的引擎,它将数据中心转变为自我管理、高度可扩展、高度可用和易于消费的资源池。云计算环境中虚拟化和虚拟机(VM)使用的增加引起了计算机安全研究界对云计算中大量使用虚拟机可能产生的潜在危害的大量关注。本文研究了利用远程IP和ICMP数据包时间戳检测方法以及时间戳行为来检测VM的方法,并对其进行了测试和调查,以确定高性能云计算基础设施中是否仍然存在该问题。本研究结果表明,即使在高性能私有云计算环境下,从VM和非VM机器接收到的时间戳应答行为也存在明显差异。这些结果证明,即使在高性能云计算基础设施中,时间戳检测方法也可能被恶意软件利用作为虚拟机检测方法。根据本研究的发现,我们提出了在独立环境下回复时间戳的理论,这种差异类似于VM。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Virtual machine remote detection method using network timestamp in cloud computing
As any new technology advancement, cloud computing also creates disruptive possibilities and security risk potentials. Virtualization which are the engine that drives cloud computing turns the data center into self-managing, highly scalable, highly available and pools of easily consumable resources. The increase in virtualization and usage of virtual machines (VM) in cloud computing environment has attracted a lot of attention from the computer security research community on the potential treats that could occurs from vast use of virtual machines in cloud computing. In this paper, methods for detecting VM using remote IP and ICMP packet timestamp detection methods and the timestamp behavior are studied, tested and investigated to determine either the problem still exist in high performance cloud computing infrastructure. The results from this study shows that there were distinguishable differences in the timestamp replies behaviors received from VM and non-VM machines even in a high performance private cloud computing environment. These results prove a significant potential that timestamp detection method could be exploited by malware as a VM detection method even in high performance cloud computing infrastructure. From the finding of this study, we proposed theory for the stand-alone environment to reply timestamp in such differences similar to the VM.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信