Visible to the public Trustworthy Services Built on Event-Based Probing for Layered Defense

TitleTrustworthy Services Built on Event-Based Probing for Layered Defense
Publication TypeConference Paper
Year of Publication2017
AuthorsSprabery, R., Estrada, Z. J., Kalbarczyk, Z., Iyer, R., Bobba, R. B., Campbell, R.
Conference Name2017 IEEE International Conference on Cloud Engineering (IC2E)
ISBN Number978-1-5090-5817-4
Keywordsattack detection, cloud computing, cloud computing environments, cloud-tuned intrusion detection system, composability, cyber physical systems, defense-in-depth, event-based probing, feature extraction, guest-system-call events, Hardware, hypervisor, IDS, Intrusion detection, layered defense, Memory management, Monitoring, Probes, pubcrawl, Registers, Resiliency, system hangs, system monitoring, Trusted Computing, trustworthy logging, trustworthy services, Trustworthy Systems, virtual appliance, Virtual machine monitors, VMI, watchdogs
Abstract

Numerous event-based probing methods exist for cloud computing environments allowing a hypervisor to gain insight into guest activities. Such event-based probing has been shown to be useful for detecting attacks, system hangs through watchdogs, and for inserting exploit detectors before a system can be patched, among others. Here, we illustrate how to use such probing for trustworthy logging and highlight some of the challenges that existing event-based probing mechanisms do not address. Challenges include ensuring a probe inserted at given address is trustworthy despite the lack of attestation available for probes that have been inserted dynamically. We show how probes can be inserted to ensure proper logging of every invocation of a probed instruction. When combined with attested boot of the hypervisor and guest machines, we can ensure the output stream of monitored events is trustworthy. Using these techniques we build a trustworthy log of certain guest-system-call events. The log powers a cloud-tuned Intrusion Detection System (IDS). New event types are identified that must be added to existing probing systems to ensure attempts to circumvent probes within the guest appear in the log. We highlight the overhead penalties paid by guests to increase guarantees of log completeness when faced with attacks on the guest kernel. Promising results (less that 10% for guests) are shown when a guest relaxes the trade-off between log completeness and overhead. Our demonstrative IDS detects common attack scenarios with simple policies built using our guest behavior recording system.

URLhttp://ieeexplore.ieee.org/document/7923805/
DOI10.1109/IC2E.2017.36
Citation Keysprabery_trustworthy_2017