Process-based Security Detection Approach for Virtual Machines on Private Cloud Platforms

A process-based security detection method PAMon is proposed in this paper based on analysis of current security detection techniques for virtual machines on private cloud platforms. The modules of PAMon, including semantic reconstruction, hidden process detection, resource utilization analysis, comprehensive analysis, and so forth, are thoroughly analyzed and investigated. To validate the feasibility of PAMon, a miniaturized private cloud was configured aided by Xen and eucalyptus technology. Through experiments, it is demonstrated that the PAMon detection system can effectively address malicious programs running on the monitored virtual machines by comprehensively analyzing the critical processes, hidden processes, and resource-seizing processes. Moreover, this detection system is more comprehensive, thorough, and reliable than existing detection techniques.

[1]  Joel-Ahmed M. Mondol Cloud security solutions using FPGA , 2011, Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.

[2]  Ning Wang,et al.  LCCWS: Lightweight Copyfree Cross-layer Web Server , 2013, J. Networks.

[3]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[4]  Idit Keidar,et al.  Trusting the cloud , 2009, SIGA.

[5]  Roberto Di Pietro,et al.  Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..

[6]  Hongpeng Liu,et al.  Intelligent Storage and Retrieval Systems Based on RFID and Vision in Automated Warehouse , 2012, J. Networks.

[7]  Andrea C. Arpaci-Dusseau,et al.  Antfarm: Tracking Processes in a Virtual Machine Environment , 2006, USENIX Annual Technical Conference, General Track.

[8]  Xuxian Jiang,et al.  Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.

[9]  Fei Yu,et al.  Improved MFCC Feature Extraction Combining Symmetric ICA Algorithm for Robust Speech Recognition , 2012, J. Multim..

[10]  Wenke Lee,et al.  Secure and Flexible Monitoring of Virtual Machines , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).