International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 08 Issue: 06 | June 2021
p-ISSN: 2395-0072
www.irjet.net
A Novel VM Hardening Policy for Enhancing VM Security under CrossVirtualization Platform Golam Mostafa 1, Ananta Uzir 2, Nirmalya Mukhopadhyay 3 1Dept.
of Computer Science and Engineering, Assam Downtown University, Assam, India of Computer Science and Engineering, Assam Downtown University, Assam, India 3Assistant Professor, Dept. of Computer Science and Engineering, Assam Downtown University, Assam, India ---------------------------------------------------------------------***---------------------------------------------------------------------Virtualization uses software to create an abstraction ABSTRACT: To reduce IT expenses while boosting layer over computer hardware that allows the efficiency and agility for all size businesses the most of hardware elements of a single computer or simply the organizations use virtualization technique. In virtual machines. simple words Virtualization is the technique of splitting a physical resource into as many logical resources we A Virtual Machine is a compute resource that want or we can say that it is a technology that uses software instead of a physical computer to run transforms hardware into software. It is the single programs and deploy apps. It is most effective way. So, securing virtual machines in a virtualization/emulation of a physical computer virtualized environment is equally important as system. Virtual machines are based on computer securing physical servers. By hardening the VMs we architectures and provide functionality of a physical can secure the Virtual Machines. Vulnerabilities in computer. Their implementation may involve virtual machine is crucial because virtualization eases specialized hardware, software, or a combination. many aspects of IT management. Weaknesses in virtual Virtual machines allow you to run an operating system machine can be treats such as VM sprawl, Hyper in an app window on your desktop that behaves like a jacking, VM escaping, Denial of services, etc. Since VMs full, separate computer. The main purpose of VMs is to are increasingly seen as a legacy technology, malicious operate multiple operating systems at the same time, VM can do whatever it wants. Early detection of from the same piece of hardware. Without vulnerabilities in virtualization is very important for virtualization or Virtual Machines, operating multiple virtualization and to protect against malicious attacks systems like Windows and Linux would require two that cause to information leak. Now, there are many separate physical units. Because applications run based tools are there which can detect commons flows in on specific OS capabilities, Businesses that use a wide software implementation, but many of the array of applications might find themselves deploying virtualization vulnerabilities are unique that can hardly many different consoles and hardware installations to address by existing techniques. This abstraction means manage their apps. This can become unwieldy and that a virtual machine can be harden so that it makes expensive. Hardware requires physical space that isn’t less vulnerable to data breaches. In this research paper always available. Hardware also requires plenty of we conducted analyses of some vulnerabilities. Based upkeep costs, repair costs when hardware fails, on the vulnerabilities, we propose frameworks to these maintenance costs to make sure your hardware stays vulnerabilities for the virtual platforms which can find in shape and energy costs for power and cooling. detect the bugs in virtualization and also, we give Virtualization keeps costs down by placing all your OSs solutions to harden the VMs. into a cloud-like structure, with multiple instances running on the same underlying, local hardware- which Key words: VM Hardening, Virtualization Security, Cloud eliminates the need for hardware accumulation and Computing, Multi-tenancy. excessive overhead. INTRODUCTION The host VMs requires a hypervisor Cloud computing is a fast-growing computing (specialized software). The hypervisor emulates the technology that has been adopting by maximum IT computer’s CPU, memory, hard disk, network and other organizations. Virtualization is the core computing hardware resources that can be allocated to the VMs technology in cloud computing. Virtualization enables according to their requirements. So, VM is a very the dynamic allocation and modifications of multiple crucial technology much important, security in Virtual Virtual machines with one physical host machine. Machine is equally important. Virtual Machine 2Dept.
© 2021, IRJET
|
Impact Factor value: 7.529
|
ISO 9001:2008 Certified Journal
|
Page 778