-
CSE543 - Introduction to Computer and Network Security Page
CSE543 - Computer and Network Security Module: Virtualization
Professor Trent Jaeger
1
CSE543 - Computer and Network Security Module: Virtualization - - PowerPoint PPT Presentation
CSE543 - Introduction to Computer and Network Security Page
1
CSE543 - Computer and Network Security Page
2
CSE543 - Computer and Network Security Page
characteristics of computing resources from the way in which others systems, applications, and end users interact with those resources”
3
CSE543 - Computer and Network Security Page
4
CSE543 - Computer and Network Security Page
5 Penn State Systems and Internet Infrastructure Security Lab Page
Hardware! Host OS! VMM!
Guest OS 1! Guest OS 2! App! App!
Hardware!
Host OS! VMM!
Guest OS 1! Guest OS 2! App! App!
Hardware! VMM!
Guest OS 1! Guest OS 2! App! App!
Type 2 VMM! Type 1 VMM! Hybrid VMM!
JVM! CLR! VMware Workstation! MS Virtual Server! KVM! VMware ESX! Xen! MS Hyper-V!
CSE543 - Computer and Network Security Page
6
CSE543 - Computer and Network Security Page
7
CSE543 - Computer and Network Security Page
VAX/SVS for High-Assurance VM Systems, IEEE S&P Magazine, 2012
8
Ultrix OS VMS OS
VMM Security Kernel
VMS OS Applications (Top Secret) Applications (Secret) Applications (Unclassified) Memory Device Disk Device Print Device Display Device
CSE543 - Computer and Network Security Page
9
CSE543 - Computer and Network Security Page
10
CSE543 - Computer and Network Security Page
11
CSE543 - Computer and Network Security Page
12
CSE543 - Computer and Network Security Page
13 Penn State Systems and Internet Infrastructure Security Lab Page
Application! Application!
System ! Software!
RAM!
Peripheral! Peripheral! Peripheral!
Application!
MMU! IOMMU! control
CSE543 - Computer and Network Security Page
14
Guest OS’ Guest OS’
Partitioned Resources Device Requests
Host OS’
Drivers
VM Services
CSE543 - Computer and Network Security Page
15
CSE543 - Computer and Network Security Page
16
Guest OS’ Guest OS’
Guest OS’ Guest OS’
CSE543 - Computer and Network Security Page
17
Guest OS’ Guest OS’
Partitioned Resources Device Requests
Host OS’
Drivers
VM Services
Ref Mon
CSE543 - Computer and Network Security Page
18
CSE543 - Computer and Network Security Page
19
CSE543 - Computer and Network Security Page
20
Policy Framework Metadata Guest OS OS Interface Library Guest OS Guest Apps Virtual Machine Virtual Machine Monitor
callback or Response
Policy Modules Query Response Hardware State Config File Policy Engine IDS Monitored Host
Command
Figure 1. A High-Level View of our VMI-Based IDS Architecture: On the right is the virtual machine (VM) that
runs the host being monitored. On the left is the VMI-based IDS with its major components: the OS interface library that provides an OS-level view of the VM by interpreting the hardware state exported by the VMM, the policy engine consisting of a common framework for building policies, and policy modules that implement specific intrusion detection policies. The virtual machine monitor provides a substrate that isolates the IDS from the monitored VM and allows the IDS to inspect the state of the VM. The VMM also allows the IDS to interpose on interactions between the guest OS/guest applications and the virtual hardware.
CSE543 - Computer and Network Security Page
21
CSE543 - Computer and Network Security Page
22
CSE543 - Computer and Network Security Page
23
CSE543 - Computer and Network Security Page
24
CSE543 - Computer and Network Security Page
25
CSE543 - Computer and Network Security Page
26
CSE543 - Computer and Network Security Page
27
CSE543 - Computer and Network Security Page
28
CSE543 - Computer and Network Security Page
29