VmiCVS: Cloud Vulnerability Scanner

نویسندگان

  • Anil Kumar
  • Konasale Krishna
  • Robert Ricci
چکیده

Every service that runs in cloud systems comes with its own set of vulnerabilities. It is important to detect and assess those vulnerabilities to provide seamless and secure service to the users. Various scanners such as Port scanner, Network scanner, Web application security scanner, Database security scanner, Host based vulnerability scanner etc provide security assessment. But these scanners use methods that an attacker uses to attack in order to expose the vulnerabilities. As a result, application ecosystem might get disturbed and hard-to-attack vulnerabilities might left undetected. A yet another set of scanners check version of the service through protocol level messages in order to determine the vulnerabilities applicable to that particular service version. With this approach, certain vulnerabilities are not discovered when a particular software piece(example : glibc) is not directly exposed to the remote user. We propose a novel Cloud Vulnerability Scanner, VmiCVS (Virtual Machine Introspection based Cloud Vulnerability Scanner). It provides security assessment of vulnerabilities even if the software is hidden from remote user and without disturbing application ecosystem. It can be used by cloud provider to provide Vulnerability scanning-as-a-service where detected vulnerabilities are reported to tenant for additional incentives. We have evaluated our scanner by assessing the vulnerabilities of services such as sshd and hidden(from remote user) libraries such as glibc and libcrypto.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing

Security-as-a-service (SaaS) is an outsourcing model for security management in cloud computing. Vulnerability scanners based on cloud computing is becoming one of the killer applications in SaaS due to the pay-per-use manner and powerful scanning capability. When performing vulnerability scanning through network, the scanner needs to establish a large number of TCP connections with the target ...

متن کامل

A novel method for locating the local terrestrial laser scans in a global aerial point cloud

In addition to the heterogeneity of aerial and terrestrial views, the small scale terrestrial point clouds are hardly comparable with large scale and overhead aerial point clouds. A hierarchical method is proposed for automatic locating of terrestrial scans in aerial point cloud. The proposed method begins with detecting the candidate positions for the deployment of the terrestrial laser scanne...

متن کامل

Detection of some Tree Species from Terrestrial Laser Scanner Point Cloud Data Using Support-vector Machine and Nearest Neighborhood Algorithms

acquisition field reference data using conventional methods due to limited and time-consuming data from a single tree in recent years, to generate reference data for forest studies using terrestrial laser scanner data, aerial laser scanner data, radar and Optics has become commonplace, and complete, accurate 3D data from a single tree or reference trees can be recorded. The detection and identi...

متن کامل

Proactive Vulnerability Assessments with Nessus

Proactive Vulnerability Assessments with Nessus The goal of this paper is to illustrate the benefits of deploying Nessus as a low-cost vulnerability scanner as a supplement to an existing security model. I'll discuss vulnerability scanning in general, what Nessus is all about, how to begin scanning your network, and finally why a vulnerability scanner is an essential component of an effective s...

متن کامل

Reliable Library Identification Using VMI Techniques

For cloud providers it is important to offer services that safeguard their users from existing vulnerabilities. Research has shown that is not uncommon for libraries to contain vulnerabilities that can have serious security implications. Traditional host based vulnerability scanners can be used to identify such vulnerable libraries. However, these scanners require the user to install and mainta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016