Securing the Virtual Infrastructure in the Laas Cloud Computing Model
Total Page:16
File Type:pdf, Size:1020Kb
Securing the Virtual Infrastructure in the IaaS Cloud Computing Model by Amani S. Ibrahim This thesis is submitted in fulfilment of the requirements for the degree of Doctor of Philosophy. Faculty of Science, Engineering and Technology Swinburne University of Technology October 2014 Abstract With the advent of virtualization, the Infrastructure-as-a-Service (IaaS) cloud computing model has been widely deployed by organizations. One of the main issues with this model is the un- trusted client virtual machines security problem. Unlike traditional physical servers that are directly managed and protected by their owners, the security of hosted virtual machines in the IaaS platform relies on the cloud customer, who might be a malicious hacker. Moreover, these hosted virtual machines are owned and controlled by a cloud consumer, and at the same time they are hosted by a cloud provider. Thus, both consumers and providers claim the right to provide the security for the hosted virtual machines from their own perspectives, causing a loss-of-control security problem. In this research project, we address the loss-of-control security problem of the IaaS plat- form by introducing the concept of virtualization-aware security solutions. Virtualiza- tion-aware security solutions enable both cloud providers and consumers to fully utilize the virtualization advantages of the IaaS platform from both perspectives. Particularly, we introduce CloudSec++, a security appliance that has the ability to provide active, transparent and real-time monitoring and protection for the running operating systems in the hosted virtual machines, from outside the virtual machines themselves. CloudSec++ enables provision of security from a cloud provider’s perspective with no need to have any control over the hosted virtual machines, while passively incorporating consumers in maintaining the security of their hosted virtual machines. CloudSec++ has the ability to systematically protect multiple concurrent guest op- erating systems against zero-day threats that could target operating system’s kernel. In particular, CloudSec++ has the ability to defend against different types of pointer-manipulation attacks (whether known or unknown) that target kernel dynamic data and memory. Implementing such a virtualization-aware security solution is a multi-disciplinary research project, where a number of new mechanisms and techniques were introduced to address dif- ferent challenging problems. These mechanisms and techniques include: (i) a virtual machine introspection framework that enables active and transparent monitoring of the hosted virtual II machines at a hypervisor level. (ii) A new points-to analysis algorithm and a kernel dynamic objects discovery tool to support the automation of overcoming the semantic gap problem of hosted virtual machines, without a prior knowledge of the operating system’s kernel runtime data layout. (iii) A set of operating system runtime security tools that has the ability to defend against kernel dynamic data zero-day threats in a real-time fashion. (iv) A security appliance to host and deploy our developed virtualization-aware security solution in the IaaS platforms. III Acknowledgements I would like to express my heartfelt gratitude and thanks to my supervisors, Prof. John Grundy and Dr. James Hamlyn-Harris, for their support, guidance, and mentorship over the past four years. I thank both of them for their steadfast encouragement and invaluable advice. They greatly supported me to hurdle all the obstacles in the completion of this research work. Hon- estly, I have always counted myself very lucky and blessed to have both of them as my super- visors. I also thank all the friends, colleagues, and staff at SUCCESS, especially Gillian Foster, for all their help and support during my PhD journey. My highest and warmest gratitude, appreciation, and thanks to my parents, brother, sister and friends for their endless love, encouragement, and support to me to go through the ups and downs of my life including my PhD journey. A special feeling of gratitude to my mother who has been a source of encouragement and inspiration throughout my life. I also cannot forget to thank my kids Malak and Adam for being helpful and supportive in delaying me towards fin- ishing this work but honestly I enjoyed the journey with them. I have done my best to be a good and friendly mum for them during my PhD despite my responsibilities. Last but not least, the love of my life, my husband, Mohamed. No words can express my love and sincere gratitude towards him. I could not achieve anything in my life and this thesis is not an exception without him. He has been a great supporter at work and at home, with endless love and encouragement. Very special thanks for your practical and emotional support. Financial support for this research was provi ded by Swinburne Uni versity of Technology and VMsafe libraries research licence was provided by VMware. This PhD thesis is dedicated to the memory of my dear father. Declaration Hereby I certify that, this thesis contains no material which has been accepted for the award of any other degree or diploma, except where due reference is made in the text of the thesis. To the best of my knowledge, this thesis contains no material previously published or written by an- other person except where due reference is made in the text of the thesis. ______________________ Amani S. Ibrahim ______________________ Date V List of Publications A big portion of this research project was published in a number or papers. Below is a list of my publications during my PhD journey relevant to this thesis topic: 1. Amani S. Ibrahim, John C. Grundy, James Hamlyn-Harris, Mohamed Almorsy, "DIGGER: Identifying Operating System Dynamic Kernel Objects for Run-time Security Analysis", International Journal on Internet and Distributed Computing Systems (IJIDCS), 2013. 2. Amani S. Ibrahim, John C. Grundy, James Hamlyn-Harris, Mohamed Almorsy, "Identi- fying OS Kernel Runtime Objects for Run-time Security Analysis", 6th International Conference on Network and System Security (NSS 2012), Nov 21-23 2012, Wu Yi Shan, Fujian, China, Springer. 3. Amani S. Ibrahim, John C. Grundy, James Hamlyn-Harris, Mohamed Almorsy, "Operating System Kernel Data Disambiguation to Support Security Analysis", 6th International Conference on Network and System Security (NSS 2012), Nov 21-23 2012, Wu Yi Shan, Fujian, China, Springer. 4. Amani S. Ibrahim, John C. Grundy, James Hamlyn-Harris, Mohamed Almorsy, "Sup- porting Operating System Kernel Data Disambiguation using Points-to Analysis", 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012), Sept 3-7 2012, Essen, Germany, ACM Press. 5. Amani S. Ibrahim, James Hamlyn-Harris, John Grundy and Mohamed Almorsy, "Sup- porting Virtualizaion-Aware Security Solutions using a Systematic Approach to Overcome the Semantic Gap", 5th IEEE Conference on Cloud Computing (CLOUD 2012), IEEE CS Press, Waikiki, Hawai, USA, June 24-29 2012. 6. Amani S. Ibrahim, James Hamlyn-Harris, John Grundy and Mohamed Almorsy, "CloudSec: A Security Monitoring Appliance for Virtual Machines in the IaaS Cloud Model", 5th International Conference on Network and System Security (NSS 2011), Milan, Italy on 6 – 8 September, 2011. 7. Amani S. Ibrahim, James Hamlyn-Harris and John Grundy, "Emerging Security Chal- lenges of Cloud Virtual Infrastructure", In Proceedings of the 2010 Asia Pacific Cloud Workshop 2010 (co located with APSEC2010), Sydney, Nov 30 2010. 8. Mohamed Almorsy, John Grundy, and Amani S. Ibrahim, "Adaptive Security Management in SaaS Applications", Security, Privacy and Trust in Cloud Systems, Book Springer (in press). 9. Mohamed Almorsy, John Grundy, and Amani S. Ibrahim, "Adaptable, Model-driven Se- curity Engineering for SaaS Cloud-based Applications", Automated Software Engineering Journal, to appear. VI Other papers co-authored during my PhD: 1. Mohamed Almorsy, John C. Grundy, Amani S. Ibrahim, "MDSE@R: Model-Driven Se- curity Engineering at Runtime”, The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), Dec 12-13 2012, Melbourne, Australia. 2. Mohamed Almorsy, John Grundy, and Amani S. Ibrahim, "Automated Software Archi- tecture Security Risk Analysis Using Formalized Signatures", 2013 IEEE/ACM Interna- tional Conference on Software Engineering (ICSE 2013), San Franciso, May 2013, IEEE CS Press. 3. Mohamed Almorsy, John C. Grundy, Amani S. Ibrahim, "VAM-aaS: Online Cloud Ser- vices Security Vulnerability Analysis and Mitigation-as-a-Service”, The 13th International Conference on Web Information System Engineering (WISE 2012), Nov 28-30 2012, Paphos, Cyprus, Springer. 4. Mohamed Almorsy, John C. Grundy, Amani S. Ibrahim, "Supporting Automated Vulnera- bility Analysis using Formalized Vulnerability Signatures", 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012), Sept 3-7 2012, Essen, Germany, ACM Press. 5. Mohamed Almorsy, John C. Grundy, Amani S. Ibrahim, "Supporting Automated Software Re-Engineering Using "Re-Aspects”, 27th IEEE/ACM International Conference on Au- tomated Software Engineering (ASE 2012), Sept 3-7 2012, Essen, Germany, ACM Press. 6. Mohamed Almorsy, John Grundy and Amani S. Ibrahim, "TOSSMA: A Tenant-Oriented SaaS Security Management Architecture", 5th IEEE Conference on Cloud Computing (CLOUD 2012), IEEE CS Press, Waikiki, Hawai, USA, June 24-29 2012. 7. Mohamed Almorsy, John Grundy and Amani S. Ibrahim, "SMURF: Supporting Mul- ti-tenancy Using Re-Aspects