Trustworthy Services Built on Event-Based Probing for Layered Defense
Title | Trustworthy Services Built on Event-Based Probing for Layered Defense |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Sprabery, R., Estrada, Z. J., Kalbarczyk, Z., Iyer, R., Bobba, R. B., Campbell, R. |
Conference Name | 2017 IEEE International Conference on Cloud Engineering (IC2E) |
ISBN Number | 978-1-5090-5817-4 |
Keywords | attack detection, cloud computing, cloud computing environments, cloud-tuned intrusion detection system, composability, cyber physical systems, defense-in-depth, event-based probing, feature extraction, guest-system-call events, Hardware, hypervisor, IDS, Intrusion detection, layered defense, Memory management, Monitoring, Probes, pubcrawl, Registers, Resiliency, system hangs, system monitoring, Trusted Computing, trustworthy logging, trustworthy services, Trustworthy Systems, virtual appliance, Virtual machine monitors, VMI, watchdogs |
Abstract | Numerous event-based probing methods exist for cloud computing environments allowing a hypervisor to gain insight into guest activities. Such event-based probing has been shown to be useful for detecting attacks, system hangs through watchdogs, and for inserting exploit detectors before a system can be patched, among others. Here, we illustrate how to use such probing for trustworthy logging and highlight some of the challenges that existing event-based probing mechanisms do not address. Challenges include ensuring a probe inserted at given address is trustworthy despite the lack of attestation available for probes that have been inserted dynamically. We show how probes can be inserted to ensure proper logging of every invocation of a probed instruction. When combined with attested boot of the hypervisor and guest machines, we can ensure the output stream of monitored events is trustworthy. Using these techniques we build a trustworthy log of certain guest-system-call events. The log powers a cloud-tuned Intrusion Detection System (IDS). New event types are identified that must be added to existing probing systems to ensure attempts to circumvent probes within the guest appear in the log. We highlight the overhead penalties paid by guests to increase guarantees of log completeness when faced with attacks on the guest kernel. Promising results (less that 10% for guests) are shown when a guest relaxes the trade-off between log completeness and overhead. Our demonstrative IDS detects common attack scenarios with simple policies built using our guest behavior recording system. |
URL | http://ieeexplore.ieee.org/document/7923805/ |
DOI | 10.1109/IC2E.2017.36 |
Citation Key | sprabery_trustworthy_2017 |
- Memory management
- watchdogs
- VMI
- Virtual machine monitors
- virtual appliance
- Trustworthy Systems
- trustworthy services
- trustworthy logging
- Trusted Computing
- system monitoring
- system hangs
- Resiliency
- Registers
- pubcrawl
- Probes
- Monitoring
- Attack detection
- layered defense
- Intrusion Detection
- IDS
- hypervisor
- Hardware
- guest-system-call events
- feature extraction
- event-based probing
- defense-in-depth
- cyber physical systems
- composability
- cloud-tuned intrusion detection system
- cloud computing environments
- Cloud Computing