Method and system for detecting cloned virtual machine instances
A virtual machine instance and virtual machine technology, applied in the information field, can solve problems such as information leakage, privacy and/or confidentiality leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0009] As described herein, one aspect of the invention includes preventing information disclosure and theft due to virtual machine (VM) cloning, and preventing unauthorized re-instantiation of VMs. At least one embodiment of the invention includes using a hard-to-detect malware-type agent to detect whether a VM is a genuine VM or a copy or clone, and deactivating an instance of the cloned VM by the malware-type agent upon detection.
[0010] At least one embodiment of the invention can be practiced in a context such as the following example scenario. Customers or third parties run servers that track unique VMs. A VM running in the cloud runs an agent (on the VM) that reports a unique identifier to the server periodically or randomly. Therefore, to evade detection by individual users or entities wishing to clone a VM without the customer's permission, one aspect of the present invention includes running the agent in a malware-like manner (e.g., attaching to a dynamic link lib...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


