A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling

Most companies and organizations rely nowadays on virtualized environments to host and run their applications. Some of these applications have stringent availability and security requirements. An important challenge for high availability in virtualized systems is software aging, which can lead the system to hangs or other types of failures. Software rejuvenation is applied to cope with software aging problems, whereas previous research suggests the use of Virtual Machine (VM) migration to reduce the downtime related to Virtual Machine Monitor (VMM) software rejuvenation. However, there is still a gap regarding the security implications of applying VM migration scheduling as support for VMM software rejuvenation. In this paper, we propose a security evaluation approach based on an availability model for virtualized systems with VM migration for VMM rejuvenation. The goal is to find the proper rejuvenation scheduling to reach the desired levels (or at least to avoid the undesired levels) of security risk and availability. We present three case studies comprising major security threats, namely Man-in-the-middle and Denial of Service attacks. Results provide insightful information regarding the tradeoff between availability and security risk when applying VM migration scheduling for rejuvenation purposes.

[1]  Paulo Maciel,et al.  SWARE: A Methodology for Software Aging and Rejuvenation Experiments , 2018 .

[2]  Dong Seong Kim,et al.  Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration , 2013, Perform. Evaluation.

[3]  Dong Seong Kim,et al.  Sensitivity Analysis of Server Virtualized System Availability , 2012, IEEE Transactions on Reliability.

[4]  Paulo Romero Martins Maciel,et al.  Models for availability and power consumption evaluation of a private cloud with VMM rejuvenation enabled by VM Live Migration , 2018, The Journal of Supercomputing.

[5]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.

[6]  Paulo Romero Martins Maciel,et al.  Availability study on cloud computing environments: Live migration as a rejuvenation mechanism , 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[7]  Andrew Warfield,et al.  Live migration of virtual machines , 2005, NSDI.

[8]  Gregory Levitin,et al.  Optimizing software rejuvenation policy for real time tasks , 2018, Reliab. Eng. Syst. Saf..

[9]  Sushil Jajodia,et al.  Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.

[10]  Julian Jang,et al.  Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[11]  Julian Jang,et al.  Comprehensive Security Assessment of Combined MTD Techniques for the Cloud , 2018, MTD@CCS.

[12]  Armin Zimmermann Modelling and Performance Evaluation with TimeNET 4.4 , 2017, QEST.

[13]  Paulo Romero Martins Maciel,et al.  Characterization of Software Aging Effects in Elastic Storage Mechanisms for Private Clouds , 2012, 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops.

[14]  Dejan S. Milojicic,et al.  A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade , 2018 .

[15]  Daniel P. Siewiorek,et al.  High-availability computer systems , 1991, Computer.

[16]  Stefano Russo,et al.  A survey on software aging and rejuvenation in the cloud , 2019, Software Quality Journal.

[17]  David Lorge Parnas,et al.  Software aging , 1994, Proceedings of 16th International Conference on Software Engineering.

[18]  Tuan Anh Nguyen,et al.  Reliability and Availability Evaluation for Cloud Data Center Networks Using Hierarchical Models , 2019, IEEE Access.

[19]  Brian Randell,et al.  Fundamental Concepts of Dependability , 2000 .

[20]  Paulo Romero Martins Maciel,et al.  Comparative Analysis of Migration-Based Rejuvenation Schedules on Cloud Availability , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.

[21]  Domenico Cotroneo,et al.  A survey of software aging and rejuvenation studies , 2014, ACM J. Emerg. Technol. Comput. Syst..

[22]  Tuan Anh Nguyen,et al.  A comprehensive evaluation of availability and operational cost for a virtualized server system using stochastic reward nets , 2017, The Journal of Supercomputing.

[23]  Jin B. Hong,et al.  Availability Modeling and Analysis of a Virtualized System , 2009, 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing.

[24]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[25]  Marco Vieira,et al.  Interacting SRN Models for Availability Evaluation of VM Migration as Rejuvenation on a System under Varying Workload , 2018, 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW).

[26]  Jean Araujo,et al.  An approach to investigate aging symptoms and rejuvenation effectiveness on software systems , 2017, 2017 12th Iberian Conference on Information Systems and Technologies (CISTI).

[27]  Vyas Sekar,et al.  Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration , 2015, CCS.

[28]  Jamilson Dantas,et al.  Eucalyptus-based private clouds: availability modeling and comparison to the cost of a public cloud , 2015, Computing.

[29]  Dong Seong Kim,et al.  Modeling and analysis of software rejuvenation in a server virtualized system , 2010, 2010 IEEE Second International Workshop on Software Aging and Rejuvenation.

[30]  Yennun Huang,et al.  Software rejuvenation: analysis, module and applications , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers.