Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

Research Article

Integrated Security Architecture for Virtual Machines

Download
484 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-04283-1_9,
        author={Vijay Varadharajan and Udaya Tupakula},
        title={Integrated Security Architecture for Virtual Machines},
        proceedings={Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2014},
        month={6},
        keywords={Virtualisation Trusted computing Access Control Intrusion detection Security attacks},
        doi={10.1007/978-3-319-04283-1_9}
    }
    
  • Vijay Varadharajan
    Udaya Tupakula
    Year: 2014
    Integrated Security Architecture for Virtual Machines
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-04283-1_9
Vijay Varadharajan1,*, Udaya Tupakula1,*
  • 1: Macquarie University
*Contact email: vijay.varadharajan@mq.edu.au, udaya.tupakula@mq.edu.au

Abstract

Currently virtualisation technology is being deployed widely and there is an increasing interest on virtualisation based security techniques. There is a need for securing the life cycle of the virtual machine based systems. In this paper, we propose an integrated security architecture that combines access control, intrusion detection and trust management. We demonstrate how this integrated security architecture can be used to secure the life cycle of virtual machines including dynamic hosting and allocation of resources as well as migration of virtual machines across different physical servers. We discuss the implementation aspects of the proposed architecture and show how the architecture can counteract attack scenarios involving malicious users exploiting vulnerabilities to achieve privilege escalation and then using the compromised machines to generate further attacks.