Model-Driven Dependability Analysis of Virtualization Systems

After many years of silence, virtualization recently became a hot topic once again, especially in the field of system dependability. Current researches mostly focus on more technical methods without taking into account the problem of how to verify the dependability of these technics. This paper proposes a Markov model to describe virtualization systems and gives the solving methods to quantitatively analyze their dependabilities including reliability, availability and maintainability. Through the numeric results, we get the relationship between the specific dependability evaluating attributes of virtualization systems and the characteristics of virtualization systems’ components. Then evolve some conditions which should be satisfied by the virtualization for enhancing system dependability, including the number of backup virtual machines, the failure and repair rate of hypervisor and so on.

[1]  A. Singh,et al.  Fault-tolerant systems , 1990, Computer.

[2]  Samuel T. King,et al.  Backtracking intrusions , 2003, SOSP '03.

[3]  Samuel T. King,et al.  ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.

[4]  Tal Garfinkel,et al.  Virtual machine monitors: current technology and future trends , 2005, Computer.

[5]  Samuel T. King,et al.  Enriching Intrusion Alerts Through Multi-Host Causality , 2005, NDSS.

[6]  Tal Garfinkel,et al.  Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.

[7]  Renato J. O. Figueiredo,et al.  Guest Editors' Introduction: Resource Virtualization Renaissance , 2005, Computer.

[8]  Fred B. Schneider,et al.  Hypervisor-based fault tolerance , 1996, TOCS.

[9]  Israel Koren,et al.  Fault-Tolerant Systems , 2007 .

[10]  Alessandro Birolini Reliability Engineering: Theory and Practice , 1999 .

[11]  Kasturi Narasimhan,et al.  Reliability Engineering: Theory and Practice, 4th edition , 2005 .

[12]  Samuel T. King,et al.  Detecting past and present intrusions through vulnerability-specific predicates , 2005, SOSP '05.

[13]  Tal Garfinkel,et al.  A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.

[14]  John R. Douceur,et al.  Replicated Virtual Machines , 2005 .

[15]  Z. A. Lomnicki,et al.  Mathematical Theory of Reliability , 1966 .

[16]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.