CFP last date
22 April 2024
Reseach Article

A Forensics Approach for Hypervisor

by Lokendra Pratap Singh, Mukesh Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 33
Year of Publication: 2018
Authors: Lokendra Pratap Singh, Mukesh Kumar
10.5120/ijca2018918267

Lokendra Pratap Singh, Mukesh Kumar . A Forensics Approach for Hypervisor. International Journal of Computer Applications. 182, 33 ( Dec 2018), 11-16. DOI=10.5120/ijca2018918267

@article{ 10.5120/ijca2018918267,
author = { Lokendra Pratap Singh, Mukesh Kumar },
title = { A Forensics Approach for Hypervisor },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2018 },
volume = { 182 },
number = { 33 },
month = { Dec },
year = { 2018 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number33/30241-2018918267/ },
doi = { 10.5120/ijca2018918267 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:13:09.519108+05:30
%A Lokendra Pratap Singh
%A Mukesh Kumar
%T A Forensics Approach for Hypervisor
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 33
%P 11-16
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Forensics defines as a post investigation and discussion of the survey results generated by the cyber attacks over Cloud. The exponential growth of the Cloud in private and public Sectors has also increased the Cyber Crimes in the Cloud. Virtualization is the Techniques running at the back of Cloud computing in which virtual machines simultaneously operates and application that controls and managed them is hypervisor. Many models for security of virtualization have been proposed for the protection of resources but still virtualization is being vulnerable to many attacks. Hypervisor forensics is a post approach to investigate and analyze security threats at hypervisor level. In this paper we have proposed an algorithm and implement this framework which will work for maintaining the data log file in terms of attacks graphs.

References
  1. Java virtual machine, (2014), [online]. Available:http://en.wikipedia.org/wiki [Oct,17,2017].Dalvik virtual machine, (2017),[online]. Available: http://en.wikipedia.org/wiki, [Oct, 18, 2014].
  2. B. Martini and K.-K. R. Choo, “An integrated conceptual digital forensic framework for cloud computing,”Fröhlich, B. and Plate, J. 2000. Digital Investigation, vol. 9, no. 2, pp. 71–80, November 2016.
  3. Is the Hypervisor Market Expanding or Contracting? http://www.aberdeen.com/Aberdeen-Library/8157/AI-hypervisor-server-virtualization.aspx.National vulnerability database. http://web.nvd.nist.gov/view/vuln/search.
  4. Xen, (2014), [online]. Available: http://www.xenproject.org, [Oct, 21, 2017]
  5. Nexenta Hypervisor Survey. http://www.nexenta.com/corp/nexenta-hypervisor-survey.
  6. J. Levine, J. Grizzard, and H. Owen. Detecting and categorizing kernel-level rootkits to aid future detection. IEEE Security Privacy Magazine, 4(1):24 {32, January{ February 2013}
  7. National Institute of Standards and Technology,(2014), [online] Available: http://en.wikipdeia.org/wiki, [Oct,20,2014]
  8. Ruan ,P. Jain, D. Rane, and S. Patidar, "A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment," in Information and Communication Technologies (WICT), 2011 World Congress on, pp. 456-461.
  9. Acquiring forensic evidence from infrastructure-as-a-service cloud, Josiah Dykstra, Alan T. Sherman; Digital Investigation 9 (2015) S90–S98;Elsevier Ltd doi:10.1016/j.diin.2012.05.001
  10. Jackson C, Agrawal R, Walker J, Grosky W Scenariobased design for a cloud forensics portal. IEEE International Symposium Technologies for Homeland Security (HST) 2015; 1-6. DOI 10.1109/THS.2015.7225260.
  11. Meera G, Kumar Raju Alluri BKSP, Powar D, Geethakumari G. A strategy for enabling forensic investigation in cloud IaaS. IEEE International Conference Electrical, Computer and Communication Technologies (ICECCT) 2015; 1-5. DOI 10.1109/ICECCT.2015.7226103
  12. Splunk. Available from: http://www.splunk.com/. Retrieved on Jan 10, 2016.
  13. Abbas H, Mahmoodzadeh QM, Khan FA, Pasha M. Identifying an OpenID anti-phishing scheme for cyberspace. Security and Communication Networks 2016; 9(6):481–491
  14. R. Chow, P. Golle, M. Jakobsson, R. Masuoka, and J. Molina, “Controlling Data in the Cloud:Outsourcing Computation without Outsourcing Control,” in Proc. of the 2013 ACM Workshop on Cloud Computing Security (CCSW’09), Chicago, Illinois, USA. ACM, November 2009, pp. 85–90.
  15. Jackson C, Agrawal R, Walker J, Grosky W. Scenariobased design for a cloud forensics portal. IEEE International Symposium Technologies for Homeland Security (HST) 2015; 1-6. DOI 10.1109/THS.2015.7225260.
  16. G. Grispos, T. Storer, and W. B. Glisson, “Calm before the storm: The challenges of cloud computing in digital forensics,” International Journal of Digital Crime and Forensics (IJDCF), vol. 4, no. 2, pp. 28–48, March 2012.
  17. J. Pfoh, C. Schneider, and C. Eckert, “A formal model for virtual machine introspection,” in Proc. of the 1st ACM Workshop on Virtual Machine Security (VMSec’09), Illinois, USA. ACM, November 2009, pp. 1–10.
  18. T. Lengyel, J. Neumann, S. Maresca, B. Payne, and A. Kiayias, “Virtual machine introspection in a hybridhoneypot architecture,” in the 5th USENIX conference on Cyber Security Experimentation and Test (CSET’12), Washington, USA, August 2012.
  19. A. Ibrahim, J. Hamlyn-Harris, J. Grundy, and M. Almorsy, “CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model,” in Proc. of the 5th International Conference on Network and System Security (NSS’11), Milan, Italy. IEEE, September 2011, pp. 113 –120.
  20. B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, and W. Lee, “Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection,” in Proc. of the 2011 IEEE Symposium on Security and Privacy (SP’11), Oakland, California, USA. IEEE, May 2011, pp. 297–312.
  21. D Rane J. Dykstra and A. T. Sherman, “Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques,” in Proc. of the 12th Annual Digital Forensics Research Conference (DFRWS’12), Washington, DC, USA, Digital Investigation, vol. 9, August 2012, pp.90–98.
  22. Sun Y, Jara A. An extensible and active semantic model of information organizing for the Internet of things. Personal and Ubiquitous Computing, 2017; 18(8): 1821-1833. DOI:10.1007/s00779-014-0786-z.
  23. Linux,(2014), “KVM 4.2 “, [online]. Available: http://www.linux-kvm.org, [Oct, 15, 2016]
  24. Is the Hypervisor Market Expanding or Contracting? http://www.aberdeen.com/Aberdeen-Library/8157/AI-hypervisor-server-virtualization.aspx.National vulnerabilitydatabase.http://web.nvd.nist.gov/view/vuln/search
  25. Lalit Mohan Joshi and Dr. Rajendra Bharti ” A Survey of Hypervisor Forensic in Cloud Computing” International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 IJERTV4IS050822 www.ijert.org Vol. 4 Issue 05, May-2015
  26. Lalit Mohan Joshi, Dr. Rajendra Bharti, Mukesh Kumar” Understanding Threats in Hypervisor, its Forensics Mechanism and its Research Challenges” International Journal of Computer Applications (0975 – 8887) Volume 119 – N
Index Terms

Computer Science
Information Sciences

Keywords

Hypervisor Virtual Machine rootkit Cloud Computing