首页> 外文会议>European Symposium on Research in Computer Security >Secure IDS Offloading with Nested Virtualization and Deep VM Introspection
【24h】

Secure IDS Offloading with Nested Virtualization and Deep VM Introspection

机译:使用嵌套虚拟化和深度VM Introspente卸载安全IDS

获取原文

摘要

To securely execute intrusion detection systems (IDSes) for virtual machines (VMs), IDS offloading with VM introspection (VMI) is used. In semi-trusted clouds, however, IDS offloading inside an untrusted virtualized system does not guarantee that offloaded IDSes run correctly. Assuming a trusted hypervisor, secure IDS offloading has been proposed, but there are several drawbacks because the hypervisor is tightly coupled with untrusted management components. In this paper, we propose a system called V-Met, which offloads IDSes outside the virtualized system using nested virtualization. Since V-Met runs an untrusted virtualized system in a VM, the trusted computing base (TCB) is separated more clearly and strictly. V-Met can prevent IDSes from being compromised by untrusted virtualized systems and allows untrusted administrators to manage even the hypervisor. Furthermore, V-Met provides deep VMI for offloaded IDSes to obtain the internal state of target VMs inside the VM for running a virtualized system. We have implemented V-Met in Xen and confirmed that the performance of offloaded legacy IDSes was comparable to that in traditional IDS offloading.
机译:为了安全地执行虚拟机(VM)的入侵检测系统(IDSES),使用使用VM IntrOSPention(VMI)卸载ID。但是,在半信制的云中,IDS卸载在不受信任的虚拟化系统内部不保证卸载的IDSES正确运行。假设有值得信赖的管理程序,已经提出了安全IDS卸载,但有几个缺点,因为管理程序与不受信任的管理组件紧密耦合。在本文中,我们提出了一个名为V-Met的系统,该系统使用嵌套虚拟化卸载虚拟化系统之外的IDS。由于V-MET在VM中运行不受信任的虚拟化系统,因此可信计算基础(TCB)更清晰,严格地分开。 V-MET可以阻止IDSES由不受信任的虚拟化系统损害,并允许不受信任的管理员甚至管理管理程序。此外,V-MET为卸载的IDSE提供深度VMI,以获得VM内的目标VM的内部状态,以运行虚拟化系统。我们在Xen实施了V-Met,并确认卸载遗留IDSES的表现与传统ID卸载中的履行相当。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号