Abstract
Recently, virtualization technology has revived and become the key support of the clouds. KVM (Kernel virtual machine) based on Linux kernel-level achieves its popularity however with security risks. Therefore, the virtual environment and vulnerability detecting of KVM is of theoretical significance and great application value. However, there are few reports on virtual environment and vulnerability detection for KVM. This paper introduces a virtual environment and vulnerability method which includes the CPU cycle based detection algorithms, the internet time detection algorithms and multi-thread counter detection algorithms, etc.. In the vulnerability detection of KVM, denial of service attack is simulated and its detection method is proposed. Function and performance tests are also introduced.
This work was supported by the Hi-tech Research and Development Program of China under Grant No. 2011AA01A205, National Natural Science Foundation of China under Grant No. 61003015;Beijing Natural Science Foundation(4122042); The fund of the State Key Laboratory of Software Development Environment under Grant No. SKLSDE-2012ZX-23
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. J. Mol. Biol. 147, 195–197 (1981)
May, P., Ehrlich, H.-C., Steinke, T.: ZIB Structure Prediction Pipeline: Composing a Complex Biological Workflow through Web Services. In: Nagel, W.E., Walter, W.V., Lehner, W. (eds.) Euro-Par 2006. LNCS, vol. 4128, pp. 1148–1158. Springer, Heidelberg (2006)
Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)
Czajkowski, K., Fitzgerald, S., Foster, I., Kesselman, C.: Grid Information Services for Distributed Resource Sharing. In: 10th IEEE International Symposium on High Performance Distributed Computing, pp. 181–184. IEEE Press, New York (2001)
Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: an Open Grid Services Architecture for Distributed Systems Integration. Technical report, Global Grid Forum (2002)
National Center for Biotechnology Information, http://www.ncbi.nlm.nih.gov
Karger, P.A.: Is Your Virtual Machine Monitor Secure? In: Third Asia-Pacific Trusted Infrastructure Technologies Conference, October 14-17, p. 5 (2008)
Wu, H.Q., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), November 30-December 2, pp. 18–21 (2010)
Christopher, T., Maria, H., Chad, L.: Virtualization Detection: New Strategies and Their Effectiveness (Ph.D. Thesis). Minneapolis, MN 55455: University of Minnesota (2010)
Peter, F.: Attacks on Virtual Machine Emulators. Symantec Advanced Threat Research (2008)
Mueller, S.: KVM Security Comparison (November 02, 2009), http://www.atsec.com/downloads/white-papers/kvm_security_comparison.pdf
Bazargan, F.A., Yeun, C.Y., Zemerly, J.: Understanding the security challenges of virtualized environments. In: 2011 International Conference for Internet Technology and Secured Transactions (ICITST), December 11-14, pp. 67–72 (2011)
Sun,Y.K.: Detection of KVM’s Virtual Environment and Vulnerability. Bachelor Thesis. Supervised by Ruan, L. (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ruan, L., Sun, Y., Xiao, L., Zhu, M. (2013). Detection of KVM’s Virtual Environment and Vulnerability. In: Zhang, Y., Li, K., Xiao, Z. (eds) High Performance Computing. HPC 2012. Communications in Computer and Information Science, vol 207. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41591-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-41591-3_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41590-6
Online ISBN: 978-3-642-41591-3
eBook Packages: Computer ScienceComputer Science (R0)