VIRTUALIZATION INTROSPECTION SYSTEM ON KVM-BASED CLOUD COMPUTING PLATFORMS. 100356010@nccu.edu.tw Advisor: yuf@nccu.edu.tw Software Security Lab.



Similar documents
Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Survey on virtual machine security

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

Operating Systems Virtualization mechanisms

The QEMU/KVM Hypervisor

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM

The OpenNebula Cloud Platform for Data Center Virtualization

A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

Introduction to Virtualization & KVM

Virtual Switching Without a Hypervisor for a More Secure Cloud

A Survey on Virtual Machine Security

Fighting Advanced Threats

Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009

Cloud Computing Architecture with OpenNebula HPC Cloud Use Cases

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Stephen Coty Director, Threat Research

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtual Machine Management with OpenNebula in the RESERVOIR project

Build & Manage Clouds with Red Hat Cloud Infrastructure Products. TONI WILLBERG Solution Architect Red Hat toni@redhat.com

Computing Service Provision in P2P Clouds

Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.

Is Virtualization Killing SSI Research?

KVM: Kernel-based Virtualization Driver

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 ISSN

Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista

How to Secure Infrastructure Clouds with Trusted Computing Technologies

Virtualisation. A newsletter for IT Professionals. Issue 2. I. Background of Virtualisation. Hardware

COS 318: Operating Systems. Virtual Machine Monitors

Enabling Technologies for Distributed Computing

Keyword: Cloud computing, service model, deployment model, network layer security.

OpenNebula Open Souce Solution for DC Virtualization. C12G Labs. Online Webinar

Securing Your Cloud with Xen Project s Advanced Security Features

Introduction to Cloud Computing

A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing

Getting Started Hacking on OpenNebula

KVM Security Comparison

Ezilla - WebOS Toward the Private Cloud & Possibility of Virtual Classroom

CLEVER: a CLoud-Enabled Virtual EnviRonment

Enabling Technologies for Distributed and Cloud Computing

Dynamic Load Balancing of Virtual Machines using QEMU-KVM

The MIPS architecture and virtualization

Η υπηρεσία Public IaaS ΕΔΕΤ ανάπτυξη και λειτουργία για χιλιάδες χρήστες

Compromise-as-a-Service

OpenNebula Open Souce Solution for DC Virtualization

Mitigating Information Security Risks of Virtualization Technologies

Building A Secure Microsoft Exchange Continuity Appliance

CS312 Solutions #6. March 13, 2015

Introduction to OpenStack

ovirt self-hosted engine seamless deployment

WIND RIVER SECURE ANDROID CAPABILITY

Inception: Towards a Nested Cloud Architecture

Virtual Hosting & Virtual Machines

Why is a good idea to use OpenNebula in your VMware Infrastructure?

Installing & Using KVM with Virtual Machine Manager COSC 495

An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform

Real-Time KVM for the Masses Unrestricted Siemens AG All rights reserved

Automated deployment of virtualization-based research models of distributed computer systems

Clouds, Virtualization and Security or Look Out Below

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Basics of Virtualisation

OpenNebula Open Souce Solution for DC Virtualization

Identifying Weaknesses in VM/Hypervisor Interfaces

Before we can talk about virtualization security, we need to delineate the differences between the

Sistemi Operativi e Reti. Cloud Computing


Software Defined Security Mechanisms for Critical Infrastructure Management

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Dheeraj K. Rathore 1, Dr. Vibhakar Pathak 2

The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions

How To Protect Your Cloud From Attack

Networks and Services

SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 5, October 2015 (ISSN )

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report.

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Large Construction of a Cloud IaaS with Dynamic Resource Allocation Method Using OpenStack

Veranderende bedreigingen Security in het virtuele datacenter

2) Xen Hypervisor 3) UEC

RCL: Design and Open Specification

Implementing and Managing Windows Server 2008 Hyper-V

Detection of virtual machine monitor corruptions

Topic 5a Operating System Fundamentals

Securing Virtual Applications and Servers

Comparing Open Source Private Cloud (IaaS) Platforms

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

SUSE Cloud Installation: Best Practices Using an Existing SMT and KVM Environment

How To Create A Cloud Based System For Aaas (Networking)

2972 Linux Options and Best Practices for Scaleup Virtualization

How To Understand The Power Of A Virtual Machine Monitor (Vm) In A Linux Computer System (Or A Virtualized Computer)

Is Virtualization Killing SSI Research?

Transcription:

VIRTUALIZATION INTROSPECTION SYSTEM ON KVM-BASED CLOUD COMPUTING PLATFORMS 100356010@nccu.edu.tw Advisor: yuf@nccu.edu.tw Software Security Lab.

Motivation The era of cloud computing

Motivation In the era of cloud computing, security threats could be a major stunning block.

KVM Linux Kernel Virtual Machine (KVM) is one of the most common commodity hypervisor driver deployed in the IaaS layer of clouds. KVM provides a full-virtualization environment that emulates hardware as much as possible including CPU(s), network interfaces and mother-board chips.

Attacking VM Hypervisor An intruder can attack the KVM hypervisor by exploiting a software defect in its kernel module and can get the Host privilege with which the intruder can take over the hypervisor E.g., Cloudburst Attack that exploits the software vulnerability CVE-2011-1751 (N. Elhage, 2011)

Objective We implement a system called Virtualization Introspection System(VIS) that detects and intercepts attacks from VMs by monitoring their status. Detect VMs that attack Hypervisor Detect VMs that attack other VMs Detect VMs that have been compromised VIS can be deployed on most cloud operating systems based on KVM such as OpenStack and OpenNebula.

VIS with IaaS and Cloud middle ware

Monitor VM status We collect both static and dynamic information to characterize VM behaviors Run-time status: using strace to collect underlying system calls Static status: using qemu-monitor to check installed VM image (hardware).

The VIS Architecture

VIS Monitor Monitor running behaviors/status of VMs Strace, Qemu-monitor Store the data into Behavior Databases Visualize running status Behavior Analyzer Derive policy/rules for known malicious behaviors For each rule, we implement an introspection module

VIS Introspection Modules Each is an independent python module that can be loaded dynamically to detect malicious VM on a specific behavior Policy Database Rules for the actions on malicious VMs Behavior Database Store the previously analyzed patten of malicious behavior of VMs Save the category data as Role à Period à Program à System call

VIS Behavior Checker Executes the modules to compare the behaviors of underlying VMs with policy rules Identifies VMs that are (1) executing malicious programs/system calls or (2) in compromised status Sends the domain action message to controller Controller Executes commands from Behavior Checker: destroy, shutdown, migrate etc. This can be done by passing the message to cloud middleware (e.g. OpenStack, OpenNebula) In our current implementation, we use libvirt and virsh to control the compromised and malicious VMs.

Termination: Shutdown the attack VMs!

VIS Defense Operation Termination Direct shutdown and offline migration VMs that are confirmed with severe attacks Isolation Online migration (to a physical isolated place) Potential vulnerable VMs, e.g., VMs that are identified been compromised

! Isolation: Migrate Malicious VMs and Redirect iptables

Evaluation Detect Cloudburst Attack Detect Social Engineering Attack

Detect Cloudburst Attack! Build a VM to execute the cloudburst attack

Detect Cloudburst Attack The attack exploits the KVM software defect (CVE-2011-1751: a pointer leaking that is triggered by unpluging the PIIX4_PM device)

Detect Cloudburst Attack Checking the change of QEMU device

Detect Social Engineering Attack We replay social engineering attacks on VMs Hacker VM that executes the attacks Victim VM that is compromised Normal VM that has the same operation system as Hacker VM

Detect Social Engineering Attack Hacker VM (BackTrack 5 R3) Period Initial: do nothing Period Prepare: setup the social engineering attack (send fishing emails) Period Compromise: Victim clicks malicious url to build ssh channel Period Attack I: Hacker kills the process inside Victim Period Attack II: Hacker keystorkes the Victim for Passwrod

Detect Social Engineering Attack Victim VM (Windows 7) Period Initial: Having Firewall and Anti-virus installed Period Normal: Receive fishing email with malicious url from Hacker Period Compromise: Click the malicious url Period under Attack I Period under Attack II Normal VM (BackTrack 5 R3) Do nothing.

System Call Distribution (via Strace) Normal VM- the same as Hacker VM: Period initial

Hacker VM: Period Compromise

Victim VM: Period Compromise

Run the testing Hacker VM : Period initial

01-01_normal-hacker

01-02_normal-victim

01-03_normal-normal

02-01_set-atk-hacker

02-02_set-atk-victim

02-03_set-atk-normal

03-01_atking-hacker

03-02_atking-victim

03-03_atking-normal

04-01_key_storke-hacker

04-02_key_storke-victim

04-03_key_storke-normal

05-01_kill_Proc-hacker

05-02_kill_Proc-victim

05-03_kill_Proc-normal

Clustering result

Conclusion We propose VIS, a virtualization introspection system for KVM-based cloud platforms We monitor both dynamic and static VM status We replay and characterize various attacks Detect VMs that attack VM Hypervisor Detect VMs that attack other VMs Detect VMs that are compromised VIS can do termination and online migration

Limitation VIS is limited to protection on rules that have been established Need to collect more attack patterns The rules are derived by heuristics False positives and negatives Need more sophisticated analysis, e.g., system call sequences

Q & A Thank you for your attention.