Check patentability & draft patents in minutes with Patsnap Eureka AI!

Virtual machine dispatch algorithm security verification method based on dynamic migration

A technology of scheduling algorithm and verification method, applied in the field of virtual machine and network security, can solve the problems of security threats, threats, lack of implementation methods, etc., to achieve high detection accuracy, promote security improvement, and prevent malicious damage.

Active Publication Date: 2015-09-30
PEKING UNIV
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] 2. Active modification: Internal attackers may tamper with memory data during network migration of virtual machines, thus posing a huge threat
Integer overflow vulnerabilities have been exposed many times on the Xen platform. These vulnerabilities may lead to the complete control of the entire VMM by attackers, thus causing security threats.
[0022] Disadvantages and limitations of several existing methods
[0023] 1) The security verification method of the data plane in the dynamic migration and the security verification method of the migration module in the dynamic migration are only for the penetration demonstration of the data plane and the migration module, but the data migration of the general cloud platform is encrypted, so the data Plane attacks will not work, and the penetration of the migration module depends on the security holes of the migration module. With the continuous provision of cloud platform software versions, the existing security holes will be continuously repaired, resulting in no security holes available. The security verification method of the migration module cannot be realized
[0024] 2) The existing methods for verifying the security of the control plane in dynamic migration only propose general concepts and lack specific implementation methods, so they have little guiding effect on the security hardening of the cloud platform control plane in practice

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine dispatch algorithm security verification method based on dynamic migration
  • Virtual machine dispatch algorithm security verification method based on dynamic migration
  • Virtual machine dispatch algorithm security verification method based on dynamic migration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0054] In actual situations, security researchers need to connect to the internal communication network of the cloud platform through network vulnerability scanning, password brute force cracking, social engineering, etc., and the communication network is the necessary link for the cloud scheduler to issue scheduling instructions . Then use the data packet monitoring software to monitor the data packets sent to the scheduler and the data packets from the scheduler. The format of the data packet is the AMQP protocol, so the monitoring operation can be completed by using the packet interception software Wireshark that supports AMQP protocol analysis. The data packet sent to the scheduler includes 1) real-time basic information of all physical hosts, such as available CPU, available memory resources, etc.; 2) relevant information of each virtual machine scheduling request. The data packets from the scheduler are mainly the scheduling result of the scheduler, that is, the virtual...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual machine dispatch algorithm security verification method based on dynamic migration. The method includes the steps that step1, a data message of a control plane network of a target cloud platform is monitored; step2, the data message is converted into a main machine information file, a dispatch request information file and a dispatch result information file; step3, a virtual machine dispatch algorithm to be verified screens out a filter set according to the main machine information file, the dispatch request information file and the dispatch result information file; step4, according to the filter set, a filtered main machine list per dispatch request in the dispatch request information file is obtained; step5, for each main machine list, main machine selective replacement is used for obtaining the weights of all weighing machines; step6, according to the obtained filter set and the weights of the weighing machines, whether a dispatch result main machine obtained through the dispatch requests is safe or not is predicted and judged. The method is high in detection accuracy which can reach above 99.5%.

Description

technical field [0001] The invention relates to a method for verifying the security of a virtual machine scheduling algorithm, in particular to a method for verifying the security of a virtual machine scheduling algorithm based on dynamic migration in a cloud environment, and belongs to the technical field of virtual machines and network security. Background technique [0002] At present, cloud computing technology is widely used. In cloud computing infrastructure, virtual machine dynamic migration has become an essential function of public cloud and private cloud. Virtual machine live migration refers to a technology that migrates a virtual machine from one physical machine to another, and the virtual machine continues to execute the original instructions without interruption during the migration process. Cloud service providers use virtual machine dynamic migration technology for load balancing, centralized management, fault tolerance and other technologies. Live migratio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455G06F21/12
Inventor 罗杨吴中海沈晴霓
Owner PEKING UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More