DocumentCode
599415
Title
Detecting anomalies in IaaS environments through virtual machine host system call analysis
Author
Alarifi, S.S. ; Wolthusen, Stephen D.
Author_Institution
Dept. of Math., R. Holloway, Univ. of London, London, UK
fYear
2012
fDate
10-12 Dec. 2012
Firstpage
211
Lastpage
218
Abstract
Providers and consumers of Infrastructure-as-a-Service (IaaS) virtual machine resources may be the subject of a number of attacks, particularly in public cloud environments. Detecting anomalies is hence critical both to protect against misuse and attacks, but is subject to constraints. These include primarily efficiency, but also legal and contractual restrictions limiting the depth of intrusiveness, which can be achieved by an intrusion detection system. In many cases, the IaaS provider will also have very limited insights into the actual workloads used by clients. In this paper we therefore propose to monitor system calls at the VM host level without requiring any instrumentation within VMs and argue that this level of granularity is sufficient to capture a number of relevant attack classes. This, together with the efficiency and efficacy of the approach is shown through experiments and statistical analysis in a Linux KVM-based reference scenario. The proposed system, unlike other systems such as VM Introspection (VMI), does not require any knowledge about VMs from inside nor requiring any OS or hypervisor modifications.
Keywords
Linux; cloud computing; security of data; virtual machines; IaaS environments; Infrastructure-as-a-Service; Linux KVM-based reference; VM introspection; VMI; detecting anomalies; hypervisor modifications; intrusion detection system; public cloud environments; virtual machine host system call analysis; Databases; Hidden Markov models; Internet; Linux; Monitoring; Security; Virtual machining; Cloud Computing Security; Host-Based Anomaly Detection; IDS; IaaS Security; System Calls Monitoring; Virtual Machine Monitoring;
fLanguage
English
Publisher
ieee
Conference_Titel
Internet Technology And Secured Transactions, 2012 International Conference for
Conference_Location
London
Print_ISBN
978-1-4673-5325-0
Type
conf
Filename
6470945
Link To Document