loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: M. Noorafiza 1 ; H. Maeda 2 ; R. Uda 2 ; T. Kinoshita 2 and M. Shiratori 2

Affiliations: 1 Tokyo University of Technology and National Defence University of Malaysia, Japan ; 2 Tokyo University of Technology, Japan

Keyword(s): Vulnerability, Security, Privacy, Malware, Virtual Machine, Cloud Computing.

Abstract: Virtualization is the main underlying technology for cloud computing. The popularity of cloud computing had expanded rapidly over the past few years. As any new technology advancement, cloud computing also has vulnerability possibilities and potential security risks. Therefore it is important to study and understand the underlying technologies in cloud computing and test any possible loophole that may give advantages for malware and attackers. Virtual machine (VM) is one of the basic component in cloud computing. VM itself is a program that executes multiple operating systems on one physical machine. Due to the complexity of the VM, together with the complex setting of the network environment and physical machine technology during the implementation of VM environment, vulnerability in the environment may occur. For example, the ability of malware to detect either the environment that they are attacking is on VM or not. Through this detection, the malware or attackers may hide its mal icious program since VM are commonly used as defensive system for malware detection, such as honeypots. In this paper, we present a remote detection technique for VM that uses IP timestamp option in full virtualization that could be used to detect VM environment and contributing to VM vulnerability. Evaluation of this technique was done by examining and analysing the characteristic of IP packet timestamps replies from VM and real machine. This research finding could serve as new knowledge for further studies on how to provide comprehensive protection from VM vulnerability. This research also could formulate more effective security improvement that could lead to better security policy towards VM technology. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.226.187.24

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Noorafiza, M.; Maeda, H.; Uda, R.; Kinoshita, T. and Shiratori, M. (2015). Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine. In Proceedings of the 1st International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-081-9; ISSN 2184-4356, SciTePress, pages 83-89. DOI: 10.5220/0005242000830089

@conference{icissp15,
author={M. Noorafiza. and H. Maeda. and R. Uda. and T. Kinoshita. and M. Shiratori.},
title={Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine},
booktitle={Proceedings of the 1st International Conference on Information Systems Security and Privacy - ICISSP},
year={2015},
pages={83-89},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005242000830089},
isbn={978-989-758-081-9},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 1st International Conference on Information Systems Security and Privacy - ICISSP
TI - Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine
SN - 978-989-758-081-9
IS - 2184-4356
AU - Noorafiza, M.
AU - Maeda, H.
AU - Uda, R.
AU - Kinoshita, T.
AU - Shiratori, M.
PY - 2015
SP - 83
EP - 89
DO - 10.5220/0005242000830089
PB - SciTePress