ProMoX: A Protocol Stack Monitoring Framework

Similar documents
Virtualization for Cloud Computing

Full and Para Virtualization

Chapter 2 Addendum (More on Virtualization)

Virtualization Technologies (ENCS 691K Chapter 3)

Microkernels, virtualization, exokernels. Tutorial 1 CSC469


COS 318: Operating Systems. Virtual Machine Monitors

Date: December 2009 Version: 1.0. How Does Xen Work?

Virtualization. Types of Interfaces

12. Introduction to Virtual Machines

9/26/2011. What is Virtualization? What are the different types of virtualization.

Virtual Machines. COMP 3361: Operating Systems I Winter

Virtualization. Jukka K. Nurminen

Chapter 5 Cloud Resource Virtualization

Virtualization Technology

Enabling Technologies for Distributed Computing

The Xen of Virtualization

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

x86 ISA Modifications to support Virtual Machines

Cisco Application-Centric Infrastructure (ACI) and Linux Containers

Peter Ruissen Marju Jalloh

COM 444 Cloud Computing

Distributed and Cloud Computing

Cloud Computing CS

Enabling Technologies for Distributed and Cloud Computing

FRONT FLYLEAF PAGE. This page has been intentionally left blank

High-Availability Using Open Source Software

Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors

Leveraging Thin Hypervisors for Security on Embedded Systems

Virtualization. Michael Tsai 2015/06/08

Virtualization. Pradipta De

How To Make A Minecraft Iommus Work On A Linux Kernel (Virtual) With A Virtual Machine (Virtual Machine) And A Powerpoint (Virtual Powerpoint) (Virtual Memory) (Iommu) (Vm) (

Multi-core Programming System Overview

Virtualization Technology. Zhiming Shen

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Intro to Virtualization

Compromise-as-a-Service

Virtualization. Dr. Yingwu Zhu

Red Hat Linux Internals

Performance tuning Xen

Virtualization. Introduction to Virtualization Virtual Appliances Benefits to Virtualization Example Virtualization Products

Virtual Machines. Virtualization

Rackspace Cloud Databases and Container-based Virtualization

Cloud Computing #6 - Virtualization

Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009

Flight Processor Virtualization

Chapter 14 Virtual Machines

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

What is virtualization

kvm: Kernel-based Virtual Machine for Linux

Virtual Hosting & Virtual Machines

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

How To Create A Cloud Based System For Aaas (Networking)

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

Jukka Ylitalo Tik TKK, April 24, 2006

CSE 501 Monday, September 09, 2013 Kevin Cleary

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore

The QEMU/KVM Hypervisor

Virtual Machine Security

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtualization is set to become a key requirement

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

OS Virtualization Frank Hofmann

Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader

Virtualization. Explain how today s virtualization movement is actually a reinvention

Enterprise-Class Virtualization with Open Source Technologies

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization

Hypervisors and Virtual Machines

EXPLORING LINUX KERNEL: THE EASY WAY!

High Performance VMM-Bypass I/O in Virtual Machines

Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Network virtualization in AutoI

Installing & Using KVM with Virtual Machine Manager COSC 495

Introduction of Virtualization Technology to Multi-Process Model Checking

How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox (Xeen) Xen-Virtualization (X

Virtualization in Linux

Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections

Hardware Based Virtualization Technologies. Elsie Wahlig Platform Software Architect

Networking for Caribbean Development

IOS110. Virtualization 5/27/2014 1

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool

Data Centers and Cloud Computing

Parallels Virtuozzo Containers

Virtual Machines.

OPEN SOURCE VIRTUALIZATION TRENDS. SYAMSUL ANUAR ABD NASIR Warix Technologies / Fedora Community Malaysia

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization

SDN software switch Lagopus and NFV enabled software node

Tracing Kernel Virtual Machines (KVM) and Linux Containers (LXC)

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

Bridging the Gap between Software and Hardware Techniques for I/O Virtualization

Embedded Virtualization & Cyber Security for Industrial Automation HyperSecured PC-based Control and Operation

Transcription:

ProMoX: A Protocol Stack Monitoring Framework Elias Weingärtner, Christoph Terwelp, Klaus Wehrle Distributed Systems Group Chair of Computer Science IV RWTH Aachen University http://ds.cs.rwth-aachen.de 1

Introduction Protocol stack implementations Tight integration with operating system Often implemented in the kernel Proliferation of overlay services Not only applications, but also core services New protocols need to be implemented Strong need of adequate tools Investigation of faults & erroneous behavior Performance tuning and evaluation 2

How to monitor protocol implementations? Kernel-level debuggers Breakpoint based inspection of kernel level implementations Program and debugger executed in the same context RR0D Examples: KGDB, SoftICE, Syser, RR0D... Full-System Simulators (e.g. Simics) Full simulation of system hardware Highest degree of control High overhead Utilize system virtualization 3

ProMoX: Virtualization-based monitoring of protocol stacks 4

Virtualization based protocol stack monitoring Protocol stack implementations External Monitoring Based on a legacy OS Both established and new implementations supported System virtualization Executes implementation Isolation from control context External monitoring Observe system state from outside Transparency Overlay Application Overlay Transport Layer Network Layer Operating System Context Virtualization Environment Priviledged Control Context 5

ProMoX Protocol stack monitoring framework Aims at x86 protocol stack implementations Early research prototype (Fall 2008) Open source based Xen virtual machine monitor XenAccess introspection library Goal: Monitor protocol stack implementations Genuine operating system context Support for running and suspended systems PROMOX! 6

ProMox Architecture ProMox Monitoring Instance Look-up Table Application Overlay XenAccess Introspection Priviledged Control Domain Transport Layer Network Layer Guest Domain (paravirtualized / HVM) Control Interface Virtual Network Interface Virtual Memory Virtual CPU Xen Hypervisor CPU RAM Network Interface Storage Peripherals System Hardware 7

Xen Memory Adresses Virtual memory addresses 0 Pseudo-physical FFFFFFFF 0 Machine Memory Addresses FFFFFFFF Xen distinguishes between different adress types Machine memory addresses: physical RAM Pseudo-physical memory addresses: domains Virtual memory addresses: guest operating system XenAccess manages translation 8

Protocol state introspection using Xen 1. Look-up table gives virtual address of protocol state State descriptors marked as symbol Offsets handed over to ProMoX upon domain instantiation 2. Traverse guest system page table using XenAccess Multiple look-ups required Needs knowledge about guest system paging 3. Memory is mapped to domain 0 Efficient access to protocol state descriptors 4. Analysis of memory content Access mapped memory regions Parse memory content and write to log file 9

Performance Application to Linux 2.6 TCP/IP stack Congestion window size Internal structures (e.g. netdev) Look-up performance XenAccess maintains internal cache Reduces number of actual required look-ups HVM performance superior Sample Trace of CGWD Size Caching No Caching PV-Dom. 13µs 59 µs HVM-Dom 13µs 26µ s 10

Benefits and Limitations Advantages: Transparency Investigation barely noticable Side effects are reduced Efficient look-up for known state descriptor locations Hypervisors provide needed infrastructure Disadvantages Needs knowledge about OS memory management Difficult to apply to closed source systems How to deal with paging? 11

Conclusion Proof of concept implementation For external monitoring of protocol stack implementations Based on XenAccess Introspection library Good: Monitoring is transparent Also works for suspended systems Disadvantage: Requires knowledge about virtualized systems Future Work Further maturing, evaluation and testing More convenient marking of state descriptors for lookup System event-based triggering of logging Transmission of packets Custom system events 12

Thank you for your attention? Discussion 13

14