Virtualized hosting: Devising a security policy through log analysis

Virtualized hosting: Devising a security policy through log analysis,10.1109/ICADIWT.2011.6041399,Dennis C. Guster,Olivia F. Lee,Dustin C. Rogers

Virtualized hosting: Devising a security policy through log analysis  
BibTex | RIS | RefWorks Download
The paper provides an overview of three common v irtualization threats that have been observed in log files in the authors' network and suggests solutions to mitigate those se curity vulnerabilities. The solutions offered have been i mplemented on a network with over 200 hosts 40 of which are virtualized. This paper presents a series of attacks on virtual resources within an autonomous system of a research laboratory. A series of attacks including, side-channel attacks, were observed in the system's log files. The attacks represent real-time incidents that occurred during a period of several months. It is noteworthy to report that the attacks were not caused by experiments or stimulations generated for research purposes. Rather, they represent random attacks by unknown sources to obtain information by exploiting security loop holes caused by virtualizing hosts. Fortunately, the majority of the attacks occurred while the system was still in research/development mode. As a result of these observations the design was modified several times and the security team is in the process of devising additional tools to protect against timing/monitoring side-channel attacks.
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.