A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection
Title | A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Zhan, Dongyang, Li, Huhua, Ye, Lin, Zhang, Hongli, Fang, Binxing, Du, Xiaojiang |
Conference Name | ICC 2019 - 2019 IEEE International Conference on Communications (ICC) |
Publisher | IEEE |
ISBN Number | 978-1-5386-8088-9 |
Keywords | cloud computing, dentry object monitoring, Kernel, kernel object modification monitoring, low-overhead kernel object monitoring, memory page, memory pages, monitor target kernel objects, Monitoring, operating system kernels, out-of-virtual-machine security tools, page-level memory monitor, page-level monitor, page-level monitoring, pubcrawl, security, security of data, Semantics, storage management, system monitoring, Tools, virtual machine introspection, Virtual machine monitors, virtual machine security, virtual machines, Virtual machining, virtual-machine-introspection-based security monitors, virtualisation |
Abstract | Monitoring kernel object modification of virtual machine is widely used by virtual-machine-introspection-based security monitors to protect virtual machines in cloud computing, such as monitoring dentry objects to intercept file operations, etc. However, most of the current virtual machine monitors, such as KVM and Xen, only support page-level monitoring, because the Intel EPT technology can only monitor page privilege. If the out-of-virtual-machine security tools want to monitor some kernel objects, they need to intercept the operation of the whole memory page. Since there are some other objects stored in the monitored pages, the modification of them will also trigger the monitor. Therefore, page-level memory monitor usually introduces overhead to related kernel services of the target virtual machine. In this paper, we propose a low-overhead kernel object monitoring approach to reduce the overhead caused by page-level monitor. The core idea is to migrate the target kernel objects to a protected memory area and then to monitor the corresponding new memory pages. Since the new pages only contain the kernel objects to be monitored, other kernel objects will not trigger our monitor. Therefore, our monitor will not introduce runtime overhead to the related kernel service. The experimental results show that our system can monitor target kernel objects effectively only with very low overhead. |
URL | https://ieeexplore.ieee.org/document/8761433 |
DOI | 10.1109/ICC.2019.8761433 |
Citation Key | zhan_low-overhead_2019 |
- pubcrawl
- virtualisation
- virtual-machine-introspection-based security monitors
- Virtual machining
- virtual machines
- virtual machine security
- Virtual machine monitors
- virtual machine introspection
- tools
- system monitoring
- storage management
- Semantics
- security of data
- security
- Cloud Computing
- page-level monitoring
- page-level monitor
- page-level memory monitor
- out-of-virtual-machine security tools
- operating system kernels
- Monitoring
- monitor target kernel objects
- memory pages
- memory page
- low-overhead kernel object monitoring
- kernel object modification monitoring
- Kernel
- dentry object monitoring