Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for detecting cloned virtual machine instances

A virtual machine instance and virtual machine technology, applied in the information field, can solve problems such as information leakage, privacy and/or confidentiality leakage

Active Publication Date: 2017-04-05
INT BUSINESS MASCH CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Customers or users usually aim to prevent any unauthorized VM cloning of their VMs as such cloning can lead to information disclosure or even privacy and / or confidentiality leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting cloned virtual machine instances
  • Method and system for detecting cloned virtual machine instances
  • Method and system for detecting cloned virtual machine instances

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] As described herein, one aspect of the invention includes preventing information disclosure and theft due to virtual machine (VM) cloning, and preventing unauthorized re-instantiation of VMs. At least one embodiment of the invention includes using a hard-to-detect malware-type agent to detect whether a VM is a genuine VM or a copy or clone, and deactivating an instance of the cloned VM by the malware-type agent upon detection.

[0010] At least one embodiment of the invention can be practiced in a context such as the following example scenario. Customers or third parties run servers that track unique VMs. A VM running in the cloud runs an agent (on the VM) that reports a unique identifier to the server periodically or randomly. Therefore, to evade detection by individual users or entities wishing to clone a VM without the customer's permission, one aspect of the present invention includes running the agent in a malware-like manner (e.g., attaching to a dynamic link lib...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method and system for detecting cloned virtual machine instances. The method includes: transmitting an identifier associated with a virtual machine from a malware-like agent embedded in the virtual machine to a detection entity in the network; determining whether the identifier is a unique identifier or the identification whether the identifier is a clone of an identifier associated with an individual virtual machine in the network; and if it is determined that the identifier is a clone of an identifier associated with an individual virtual machine in the network, using the identifier embedded in the virtual machine The agent in the machine initiates at least one remediation operation.

Description

technical field [0001] Embodiments of the invention relate generally to information technology and, more specifically, to virtual machine (VM) management. Background technique [0002] Virtual machines (VMs) running in the cloud can be cloned or copied. For example, a system administrator may perform cloning, a guest or user of a VM may inadvertently perform cloning, or an attacker may perform cloning maliciously. Customers or users generally aim to prevent any unauthorized VM cloning of their VMs, as such cloning can lead to information disclosure and even privacy and / or confidentiality leakage. Therefore, there is a need to limit information disclosure caused by unauthorized VM cloning. Contents of the invention [0003] In one aspect of the invention, techniques are provided for limiting information disclosure and theft due to virtual machine cloning. An exemplary computer-implemented method for detecting a cloned virtual machine instance may include the step of: tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/56G06F2221/034G06F21/554G06F21/566
Inventor S·A·巴赛特A·康杜S·萨胡
Owner INT BUSINESS MASCH CORP