VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based...

17
VIRTUAL MACHINE SECURITY SYSTEMS Kumiko Ogawa

Transcript of VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based...

Page 1: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

VIRTUAL MACHINE SECURITY SYSTEMS

Kumiko Ogawa

Page 2: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

Virtual Machine Security Systems

by Xin Zhao, Kevin Borders, Atul Prakash

Department of EECS, University of Michigan

Page 3: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

VM-Based Security

Isolation

Intruder cannot tamper with the security system, even if he or she subverted a

guest VM.

Inspection

Virtual machine monitor can access to the entire state of each guest VM

Interposition

Preiviledged instruction is present

Page 4: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

Architecture of VM-based Security Services

While VM-based security systems have different

features, they usually share a similar architecture.

Page 5: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

Host based IDS/Network based IDS

Software, log,

history HIDS

NIDS

Excellent view what is happening inside

Highly susceptible to attack

More resistant to attack

Poor view of what happening inside

Page 6: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

Livewire (VM-based IDS)

OS interface Library

Providing OS-level view of the target virtual machine by interpreting the

hardware state on the VMM

Policy Engine

Obtaining from VMM interface events and deciding whether or not the

system has been compromised

=Example=

Signature Detector

(in memory)

Page 7: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

Siren (VM-based IDS)

Detecting malicious software operating within a

guest virtual machine that attempts to send out

information over the network

keyboard

Mouse etc.

Network traffic

“Siren: Catching Evasive Malware (Short Paper)” by Kevin Borders, Xin Zhao, Atul Prakash

Page 8: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

SVFS(Secure Virtual File System)

To protect sensitive files

All access to sensitive files by applications must first

be approved by DVM.

(Data Virtual Machine)

VRPC(Virtual Remote Procedure Calls) are much faster than normal PRCs with using memory sharing

Page 9: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

Hey, You, Get Off of My Cloud: Exploring Information Leakage

in Third-Party Compute Clouds (2009) by Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage

Amazon EC2

Placement

- Placing a malicious VM on the same physical machine which

hosts the victim’s VM

- Proving co-residence

Cross-VM information leakage

- via manipulation of shared physical resource

- Side-channel attack

Page 10: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

sHype (Secure Hypervisor)

Developed by IBM

Implemented for Xen

(Access Control Module)

Ref: sHype Hypervisor Security Architecture – A Layered Approach Towards Trusted Virtual Domains

by Dr.-Ing. Reiner Sailer IBM T. J. Watson Research Center, NY

Page 11: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

VM-Based Honeypots

A honeypot is a computer system that is set up with

the sole intention of luring attackers.

Page 12: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

Honeypots

Low-interaction

- accepting packets, but only giving a minimal response

- cost effective

High-interaction

- behaving more like a normal computer

- providing more information about attacks

Page 13: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

VM-based Honeypots

Advantage

- providing resource multiplexing, which allows more

high-interaction honeypots on the same hardware

Disadvantage

- Hackers can detect VM and avoid honeypots

Page 14: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

Potemkin Virtual Honeyfarm(1)

High-interaction Honeypot system

VMM Requirement

INTERNET

Virtual Honeyfarm

Gateway

(1) Packet received by gateway

(2) VM created on demand (VM creatinon must be fast enough to maintain illusion)

Page 15: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

Potemkin Virtual Honeyfarm(2)

Traffic Reflection

INTERNET

Virtual Honeyfarm

Gateway

(1) If packets are tried to sent out to third parties…

(2) The traffic is redirected back into honeyfarm

Page 16: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

Collapsar Honeypot Center

Traffic are redirected to Collapsar Honeypot Center

Disadvantage: if redirected traffic is detected…

Collapsar Honeypot Center

Redirector

Redirector

Redirector

Page 17: VIRTUAL MACHINE SECURITY SYSTEMSdcm/Teaching/CDA5532-CloudComputing/... · 2011-10-28 · VM-Based Security Isolation Intruder cannot tamper with the security system, even if he or

Virtual Machine Security Systems

by Xin Zhao, Kevin Borders, Atul Prakash

Department of EECS, University of Michigan