Secure & flexible monitoring of virtual machine University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January.

Slides:



Advertisements
Similar presentations
Virtualization Dr. Michael L. Collard
Advertisements

Virtual Machine Technology Dr. Gregor von Laszewski Dr. Lizhe Wang.
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Bart Miller. Outline Definition and goals Paravirtualization System Architecture The Virtual Machine Interface Memory Management CPU Device I/O Network,
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
Virtual Machine Overview
Introduction to Virtualization
CS-3013 & CS-502, Summer 2006 Virtual Machine Systems1 CS-502 Operating Systems Slides excerpted from Silbershatz, Ch. 2.
Network Implementation for Xen and KVM Class project for E : Network System Design and Implantation 12 Apr 2010 Kangkook Jee (kj2181)
Cloud Computing and Virtualization Sorav Bansal CloudCamp 2010 IIT Delhi.
Server Virtualization Gina Myers. Definition Creating virtual machines (VMs) “VMs are software entities that emulate a real machine’s functionality” ◦
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Intro to Virtualization Andrew Hamilton TJ IT Technician.
Virtual Machines. Virtualization Virtualization deals with “extending or replacing an existing interface so as to mimic the behavior of another system”
Virtualization for Cloud Computing
A Brief Introduction To Virtualization Technologies Yin Yunqiao HP.
LINUX Virtualization Running other code under LINUX.
Virtualization 101.
Distributed Systems CS Virtualization- Overview Lecture 22, Dec 4, 2013 Mohammad Hammoud 1.
E Virtual Machines Lecture 4 Device Virtualization
Methodologies, strategies and experiences Virtualization.
Tanenbaum 8.3 See references
1 The Virtual Reality Virtualization both inside and outside of the cloud Mike Furgal Director – Managed Database Services BravePoint.
Operating System Virtualization
Zen and the Art of Virtualization Paul Barham, et al. University of Cambridge, Microsoft Research Cambridge Published by ACM SOSP’03 Presented by Tina.
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
An Introduction to Xen Prof. Chih-Hung Wu
CERN IT Department CH-1211 Genève 23 Switzerland t Virtualization with Windows at CERN Juraj Sucik, Emmanuel Ormancey Internet Services Group.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
ICT Day Term 4,  Virtualisation is growing in usage.  Current CPU’s are designed to support Virtualisation.  Businesses are looking at virtualisation.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2010 Seminar #1 VIRTUALIZATION EVERYWHERE.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2009 Seminar #1 VIRTUALIZATION EVERYWHERE.
Virtualization Concepts Presented by: Mariano Diaz.
Benefits: Increased server utilization Reduced IT TCO Improved IT agility.
Virtualization Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation is licensed.
Introduction 1-1 Introduction to Virtual Machines From “Virtual Machines” Smith and Nair Chapter 1.
Virtual Machine and its Role in Distributed Systems.
Presented by John Marian, Andrew Buhr, and Alvin Chen.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
High Performance Computing on Virtualized Environments Ganesh Thiagarajan Fall 2014 Instructor: Yuzhe(Richard) Tang Syracuse University.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Full and Para Virtualization
Introduction Why are virtual machines interesting?
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
Operating-System Structures
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
E Virtual Machines Lecture 1 What is Virtualization? Scott Devine VMware, Inc.
Virtualization Assessment. Strategy for web hosting Reduce costs by consolidating services onto the fewest number of physical machines
VIRTUAL MACHINE – VMWARE. VIRTUAL MACHINE (VM) What is a VM? – A virtual machine (VM) is a software implementation of a computing environment in which.
Open Source Virtualization Andrey Meganov RHCA, RHCX Consultant / VDEL
Overview of Virtualization The magic of virtual machines Borislav Varadinov Telerik Software Academy System Administrator Marian.
Virtualization Neependra Khare
XEN – The Art of Virtualisation. So what is Virtualisation? ● Makes use of spare capacity ● Run multiple instances of OSes simultaneously ● Multitasking.
Virtualization for Cloud Computing
Virtualization.
Agenda Hardware Virtualization Concepts
Virtualization Dr. Michael L. Collard
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
Virtualization overview
Virtual Servers.
1. 2 VIRTUAL MACHINES By: Satya Prasanna Mallick Reg.No
Running other code under LINUX
Virtualization Virtualization is the creation of substitutes for real resources – abstraction of real resources Users/Applications are typically unaware.
OS Virtualization.
Virtualization Techniques
Virtual machines benefits
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Hypervisor A hypervisor or virtual machine monitor (VMM) is computer software, firmware or hardware that creates and runs virtual machines. A computer.
Presentation transcript:

Secure & flexible monitoring of virtual machine University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January

Outline : VMM & Types Secure & Flexible Monitoring of Virtual Machines Xen Hypervisor Xen Architecture  Prolegomenon  Requirements  Introduction Memory Introspection 2 / 30

Outline (contd.) :  XenAccess Monitoring Library  XenAccess Virtual Memory Introspection  Conclusion Secure & Flexible Monitoring of Virtual Machines 3 / 30

Is a piece of software/hardware platform-virtualization software that allows multiple operating systems to run on a host computer concurrently. VMM (or Hypervisor) : The VM management,memory partitioning, cpu scheduling... Secure & Flexible Monitoring of Virtual Machines 4 / 30

Type 1 (bare-metal) hypervisors are software systems that VMM types :  run directly on the host's hardware.  control the hardware control and to monitor guest operating-systems. Examples include VMware ESX Server, Xen, Oracle VM Server,.. Secure & Flexible Monitoring of Virtual Machines 5 / 30

VMM types (contd.): HWW VMM Type1 Architecture Application OS Application OS Secure & Flexible Monitoring of Virtual Machines 6 / 30

Type 2 (or hosted) hypervisors are software applications running within a conventional operating-system environment. VMM types (contd.): Examples include VMware Server (formerly known as GSX), VMware Workstation,.... Secure & Flexible Monitoring of Virtual Machines 7 / 30

VMM types (contd.): HWW VMM Application OS Host os Type2 Architecture Secure & Flexible Monitoring of Virtual Machines 8 / 30

Xen is a virtual-machine monitor for x86, x86-64, Itanium and PowerPC 970 architectures Xen Hypervisor : The University of Cambridge Computer Laboratory developed the first versions of Xen for linux. As of 2009 the Xen community develops and maintains Xen as free software. Secure & Flexible Monitoring of Virtual Machines 9 / 30

Xen Hypervisor (contd.) : licensed under the GNU General Public License ( GPL2 ). Xen has traditionally used a paravirtualized approach to implement virtualization. Xen uses a split domain architecture, meaning that guest OSes are kept in unprivileged domains(domU). Type 1 of VMM types. Secure & Flexible Monitoring of Virtual Machines 10 / 30

Xen Hypervisor (contd.) : Other Domain In Xen is Domain 0 (Dom0) Xen Hypervisor HWW DOM0 DOM U Secure & Flexible Monitoring of Virtual Machines 11 / 30

boots automatically when the hypervisor boots Domain 0 (dom0) : interact with the other virtual machines receives special management privileges and direct access to all physical hardware by defaul Modified versions of Linux, NetBSD and Solaris can run as the Dom0 Secure & Flexible Monitoring of Virtual Machines 12 / 30

Domain 0 (contd.) : All Xen virtualization environments require Domain 0 to be running before any other virtual machines can be started Secure & Flexible Monitoring of Virtual Machines 13 / 30

Domain User (DomU) : EXCEPT Dom0,All paravirtualized virtual machines running on a Xen hypervisor, are referred to as DomU PV Guests Unmodified versions of Microsoft Windows and other proprietary operating systems can also run as guests if the CPU supports x86 virtualization  such CPUs include Intel VT and AMD-V. Secure & Flexible Monitoring of Virtual Machines 14 / 30

Xen Architecture : Secure & Flexible Monitoring of Virtual Machines 15 / 30

Memory Introspection : Memory introspection is the process of viewing the memory of one virtual machine from a different virtual machine. What makes memory introspection difficult is the semantic gap between the two virtual machines. This Technique most used in intrusions detection. Example : state of a system call Secure & Flexible Monitoring of Virtual Machines 16 / 30

Introduction : Monitoring application No architecture  Example : Task manager Monitoring app in VM Monitoring app is ≠ VMM Secure & Flexible Monitoring of Virtual Machines 17 / 30

Create a Architecture : Bryan D.payne & his friends Bryan D.payne is a Ph.D. Candidate in the College of Computing at the Georgia Institute of Technology Start a Project in Georgia Tech Information Security Center (GTISC) that was called XenAccess architecture. Secure & Flexible Monitoring of Virtual Machines 18 / 30

Requirements : 1. No superfluous modifications to the VMM. They designed the XenAccess architecture based on six high-level requirements. In general sense,these requirements can be seen as typical good programming guidelines,or good security guidelines. 2. No modifications to the VM or the target OS. Secure & Flexible Monitoring of Virtual Machines 19 / 30

Requirements (contd.): 3. Small performance impact. 4. Rapid development of new monitors. 5. Ability to monitor any data on target OS. 6. Target OS cannot tamper with monitors. Secure & Flexible Monitoring of Virtual Machines 20 / 30

XenAccess Monitoring Library : XenAccess is a library that simplifies the process of memory introspection for virtual machines running on the Xen hypervisor. With XenAccess, your software can run in one virtual machine and access the memory space of other virtual machines. The primary goal for the XenAccess architecture is to satisfy the six requirements stated in the Requirements. Secure & Flexible Monitoring of Virtual Machines 21 / 30

XenAccess Monitoring Library (contd.): Xen Access is implemented in C language as a shared library with 1935 source lines of code(SLOC). The two primary monitoring functionalities in XenAccess Are virtual memory introspection and virtual disk Monitoring. Secure & Flexible Monitoring of Virtual Machines 22 / 30

XenAccess Monitoring Library (contd.):  XenAccess & Requirements  Satisfy property 1 with :  Chose Xen as a virtualization solution because it is a Type I VMM (Introspection VMM) Secure & Flexible Monitoring of Virtual Machines 23 / 30

XenAccess Monitoring Library (contd.):  Satisfy property 2 with :  with Xen Infrastructure they able to design the monitoring architecture to work without Changes to the target OS.  Satisfy property 3 with :  with examine the xenAccess. Secure & Flexible Monitoring of Virtual Machines 24 / 30

XenAccess Monitoring Library (contd.):  Satisfy property 4 with :  with the XenAccess’s API (application program interface).  Satisfy property 5 with :  they desire an architecture that can monitor any data on the target OS. Secure & Flexible Monitoring of Virtual Machines 25 / 30

XenAccess Monitoring Library (contd.):  Satisfy property 6 with :  They placed the monitors in a different VM than the target OS. Xen provides sufficient isolation between VMs for this to be a viable solution. Secure & Flexible Monitoring of Virtual Machines 26 / 30

XenAccess Monitoring Functionalities :  Virtual Memory introspection  Virtual Disk Monitoring Secure & Flexible Monitoring of Virtual Machines 27 / 30

Virtual Memory introspection : Secure & Flexible Monitoring of Virtual Machines 28 / 30 XenAccess Memory introspection

Virtual Memory Introspection (contd.) :  An application that monitors for changes in the system call table  Example include :  An application that monitors the integrity of an installed LKM (Linux Kernel Modules ) Secure & Flexible Monitoring of Virtual Machines 29 / 30

conclusion :  VMM & Type  Xen Hypervisor  Memory introspection  XenAccess Monitoring Library Secure & Flexible Monitoring of Virtual Machines 30 / 30

Reference : [2] Xen introduction. accessed an 2009/12/22 [3] Xen Hypervisor. accessed an 2009/12/15 [4] Xen Domain. accessed an 2010/01/02 [1] BD Payne, M Carbone, and W Lee. “Secure and Flexible Monitoring of Virtual Machines”. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), December Secure & Flexible Monitoring of Virtual Machines

Reference : [5] Xen Domain. accessed an 2010/01/02 [6] Xen Architecture. accessed an 2009/12/15 Secure & Flexible Monitoring of Virtual Machines

Questions Secure & Flexible Monitoring of Virtual Machines