首页> 外文期刊>Computers & Security >Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection
【24h】

Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection

机译:速览:无需内省即可推断虚拟化基础架构中的程序行为

获取原文
获取原文并翻译 | 示例
       

摘要

Cloud service providers are often prohibited from accessing the content of tenant VMs, yet current techniques for monitoring attacks and unauthorized activities rely on virtual machine introspection (VMI). While the introspections are useful for narrowing down the semantic gap between the status observed at the hypervisor-level and that seen in a VM, they potentially reveal the sensitive information of a tenant stored in the machine. In this paper, we aim to infer specific program activities in a VM without VMI methods, where our approach has to solve the strong semantic gap problem. We introduce Infermatic, a system that utilizes only hypervisor-level features and supervised machine learning methods to infer program behaviors in a VM. Using the classifiers trained by Infermatic, we can also bridge the strong semantic gap by systematically identifying the semantic links between our hypervisor features and selected program behaviors. In evaluations, we demonstrate that the hypervisor features are effective in isolating program activities and do so with an average accuracy of 0.875 (AUC) for the 24 behaviors that we have identified. In addition, our statistical models (or trained classifiers) can identify the hypervisor features that accurately characterize selected program behaviors when they involve lower-level operations. We further extend Infermatic's ability to detect program behaviors to other security applications-we present a malicious VM detector for the cloud that achieves an average detection of 0.817 (AUC). Our detector shows the hypervisor features are resilient against evasion attacks even when an attacker can reduce the number of available features to the system. Moreover, we present that the detector can operate in a scalable manner by identifying a malicious VM even when the VM under inspection is collocated with other VM's operating under workloads. (C) 2018 Elsevier Ltd. All rights reserved.
机译:通常禁止云服务提供商访问租户VM的内容,但是当前用于监视攻击和未经授权的活动的技术依赖于虚拟机自省(VMI)。尽管自省对于缩小在虚拟机管理程序级别观察到的状态与在VM中观察到的状态之间的语义差距非常有用,但它们有可能揭示存储在计算机中的租户的敏感信息。在本文中,我们的目的是在没有VMI方法的情况下推断VM中的特定程序活动,其中我们的方法必须解决强烈的语义鸿沟问题。我们介绍了Infermatic,这是一个仅利用虚拟机监控程序级别的功能和受监督的机器学习方法来推断VM中程序行为的系统。使用Infermatic训练的分类器,我们还可以通过系统地识别我们的管理程序功能和选定的程序行为之间的语义联系来弥合强大的语义鸿沟。在评估中,我们证明了管理程序功能可以有效地隔离程序活动,并且对于我们确定的24个行为,其平均准确度为0.875(AUC)。此外,我们的统计模型(或经过训练的分类器)可以识别系统管理程序功能,这些功能可以在选定的程序行为涉及较低级别的操作时准确地表征这些行为。我们进一步将Infermatic的检测程序行为的能力扩展到其他安全应用程序-我们提出了一种针对云的恶意VM检测器,该检测器的平均检测率为0.817(AUC)。我们的检测器显示,即使攻击者可以减少系统可用功能的数量,虚拟机监控程序功能也可以抵抗规避攻击。此外,我们提出即使检测到的虚拟机与其他在工作负载下运行的虚拟机并置在一起,检测器也可以通过识别恶意虚拟机以可扩展的方式运行。 (C)2018 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号