Virtual machine introspection

Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for security attackers who want to gain access into the virtualization environment. InVM
    monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other virtualization security techniques.
    Original languageEnglish
    Title of host publicationSIN 14 Conf
    Subtitle of host publicationProceedings of the 7th International Conference on Security of Information and Networks
    Place of PublicationNew York
    PublisherACM
    Pages405-410
    Number of pages6
    ISBN (Print)978-1-4503-3033-6
    DOIs
    Publication statusPublished - Sep 2014

    Fingerprint

    Virtual machine
    Internet
    Monitoring
    Virtualization

    Keywords

    • virtual machine introspection
    • virtualization security
    • virtualization
    • cloud computing

    Cite this

    Win, T. Y., Tianfield, H., Mair, Q., Al Said, T., & Rana, O. F. (2014). Virtual machine introspection. In SIN 14 Conf : Proceedings of the 7th International Conference on Security of Information and Networks (pp. 405-410). New York: ACM. https://doi.org/10.1145/2659651.2659710
    Win, Thu Yein ; Tianfield, Huaglory ; Mair, Quentin ; Al Said, Taimur ; Rana, Omer F. . / Virtual machine introspection. SIN 14 Conf : Proceedings of the 7th International Conference on Security of Information and Networks. New York : ACM, 2014. pp. 405-410
    @inproceedings{fc8c3b4447964482ba14b497c9fc8273,
    title = "Virtual machine introspection",
    abstract = "Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for security attackers who want to gain access into the virtualization environment. InVMmonitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other virtualization security techniques.",
    keywords = "virtual machine introspection, virtualization security, virtualization, cloud computing",
    author = "Win, {Thu Yein} and Huaglory Tianfield and Quentin Mair and {Al Said}, Taimur and Rana, {Omer F.}",
    year = "2014",
    month = "9",
    doi = "10.1145/2659651.2659710",
    language = "English",
    isbn = "978-1-4503-3033-6",
    pages = "405--410",
    booktitle = "SIN 14 Conf",
    publisher = "ACM",

    }

    Win, TY, Tianfield, H, Mair, Q, Al Said, T & Rana, OF 2014, Virtual machine introspection. in SIN 14 Conf : Proceedings of the 7th International Conference on Security of Information and Networks. ACM, New York, pp. 405-410. https://doi.org/10.1145/2659651.2659710

    Virtual machine introspection. / Win, Thu Yein; Tianfield, Huaglory; Mair, Quentin; Al Said, Taimur ; Rana, Omer F. .

    SIN 14 Conf : Proceedings of the 7th International Conference on Security of Information and Networks. New York : ACM, 2014. p. 405-410.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    TY - GEN

    T1 - Virtual machine introspection

    AU - Win, Thu Yein

    AU - Tianfield, Huaglory

    AU - Mair, Quentin

    AU - Al Said, Taimur

    AU - Rana, Omer F.

    PY - 2014/9

    Y1 - 2014/9

    N2 - Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for security attackers who want to gain access into the virtualization environment. InVMmonitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other virtualization security techniques.

    AB - Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for security attackers who want to gain access into the virtualization environment. InVMmonitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other virtualization security techniques.

    KW - virtual machine introspection

    KW - virtualization security

    KW - virtualization

    KW - cloud computing

    U2 - 10.1145/2659651.2659710

    DO - 10.1145/2659651.2659710

    M3 - Conference contribution

    SN - 978-1-4503-3033-6

    SP - 405

    EP - 410

    BT - SIN 14 Conf

    PB - ACM

    CY - New York

    ER -

    Win TY, Tianfield H, Mair Q, Al Said T, Rana OF. Virtual machine introspection. In SIN 14 Conf : Proceedings of the 7th International Conference on Security of Information and Networks. New York: ACM. 2014. p. 405-410 https://doi.org/10.1145/2659651.2659710