A novel approach for a file-system integrity monitor tool of Xen virtual machine

Author(s):  
Nguyen Anh Quynh ◽  
Yoshiyasu Takefuji
2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Jiaxing Song ◽  
Weidong Liu ◽  
Feiran Yin ◽  
Chao Gao

Cloud computing attracted more and more attention in recent years, and virtualization technology is the key point for deploying infrastructure services in cloud environment. It allows application isolation and facilitates server consolidation, load balancing, fault management, and power saving. Live virtual machine migration can effectively relocate virtual resources and it has become an important management method in clusters and data centers. Existing precopy live migration approach has to iteratively copy redundant memory pages; another postcopy live migration approach would lead to a lot of page faults and application degradation. In this paper, we present a novel approach called TSMC (three-stage memory copy) for live virtual machine migration. In TSMC, memory pages only need to be transmitted twice at most and page fault just occurred in small part of dirty pages. We implement it in Xen and compare it with Xen’s original precopy approach. The experimental results under various memory workloads show that TSMC approach can significantly reduce the cumulative migration time and total pages transferred and achieve better network IO performance in the same time.


2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Shuhui Zhang ◽  
Xiangxu Meng ◽  
Lianhai Wang ◽  
Lijuan Xu ◽  
Xiaohui Han

Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtual machine under the assumption that the operating system (OS) version and kernel structure information are known at the hypervisor level. In this paper, we propose a model of virtual machine (VM) security monitoring based on memory introspection. Using a hardware-based approach to acquire the physical memory of the host machine in real time, the security of the host machine and VM can be diagnosed. Furthermore, a novel approach for VM memory forensics based on the virtual machine control structure (VMCS) is put forward. By analyzing the memory of the host machine, the running VMs can be detected and their high-level semantic information can be reconstructed. Then, malicious activity in the VMs can be identified in a timely manner. Moreover, by mutually analyzing the memory content of the host machine and VMs, VM escape may be detected. Compared with previous memory introspection technologies, our solution can automatically reconstruct the comprehensive running state of a target VM without any prior knowledge and is strongly resistant to attacks with high reliability. We developed a prototype system called the VEDefender. Experimental results indicate that our system can handle the VMs of mainstream Linux and Windows OS versions with high efficiency and does not influence the performance of the host machine and VMs.


Author(s):  
Prashant Tyagi ◽  
Divya Kapil ◽  
R.C. Joshi ◽  
Emmanuel S. Pilli

2010 ◽  
Vol 44 (4) ◽  
pp. 57-70 ◽  
Author(s):  
Satyam B. Vaghani
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document