DocumentCode :
628233
Title :
Intrusion detection and honeypots in nested virtualization environments
Author :
Beham, Michael ; Vlad, Marius ; Reiser, Hans P.
Author_Institution :
Inst. of IT-Security & Security Law, Univ. of Passau, Passau, Germany
fYear :
2013
fDate :
24-27 June 2013
Firstpage :
1
Lastpage :
6
Abstract :
Several research projects in the past have built intrusion detection systems and honeypot architectures based on virtual machine introspection (VMI). These systems directly benefit from the use of virtualization technology. The VMI approach, however, requires direct interaction with the virtual machine monitor, and typically is not available to clients of current public clouds. Recently, nested virtualization has gained popularity in research as an approach that could enable cloud customers to use virtualization-based solutions within a cloud by nesting two virtual machine monitors, with the inner one under control of the client. In this paper, we compare the performance of existing nested-virtualization solutions and analyze the impact of the performance overhead on VMI-based intrusion detection and honeypot systems.
Keywords :
cloud computing; performance evaluation; security of data; virtual machines; virtualisation; VMI approach; VMI-based intrusion detection systems; cloud customers; honeypot architecture; honeypot systems; nested virtualization technology; performance overhead; virtual machine introspection; virtual machine monitor; virtualization-based solutions; Cloud computing; Hardware; Intrusion detection; Performance evaluation; Support vector machines; Virtual machine monitors; Virtualization; Cloud computing; Honeypots; Intrusion detection; Nested virtualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable Systems and Networks (DSN), 2013 43rd Annual IEEE/IFIP International Conference on
Conference_Location :
Budapest
ISSN :
1530-0889
Print_ISBN :
978-1-4673-6471-3
Type :
conf
DOI :
10.1109/DSN.2013.6575329
Filename :
6575329
Link To Document :
بازگشت