A Cyber Attack-Resilient Server Using Hybrid Virtualization

被引:1
|
作者
Sano, Fumikazu [1 ]
Okamoto, Takeshi [1 ]
Winarno, Idris [2 ]
Hata, Yoshikazu [2 ]
Ishida, Yoshiteru [2 ]
机构
[1] Kanagawa Inst Technol, 1030 Shimo Ogino, Atsugi, Kanagawa 2420292, Japan
[2] Toyohashi Univ Technol, Tempaku Ku, Toyohashi, Aichi 4418580, Japan
关键词
resilient computing; biological diversity; cyber attack; hypervisor; vulnerability;
D O I
10.1016/j.procs.2016.08.210
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes a novel, cyber attack-resilient server using hybrid virtualization that can reduce the downtime of the server and enhance the diversity of operating systems by adding a Linux virtual machine. The hybrid virtualization consists of machine-and application-level virtualization. The prototype system virtualizes a machine using VMware ESXi, while the prototype system virtualizes a server application using Docker on a Linux virtual machine. Docker increases the speed at which a server application starts while requiring fewer resources such as memory and storage. Performance tests showed that the prototype system reduced the downtime of the DNS service by exploiting a vulnerability with no false positive detections compared with our previous work. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1627 / 1636
页数:10
相关论文
共 50 条
  • [31] Dynamic Attack-Resilient Routing in Software Defined Networks
    Mohan, Purnima Murali
    Gurusamy, Mohan
    Lim, Teng Joon
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2018, 15 (03): : 1146 - 1160
  • [32] Hybrid Fault-Tolerant and Attack-Resilient Cooperative Control in an Offshore Wind Farm
    Jadidi, Saeedreza
    Badihi, Hamed
    Zhang, Youmin
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, 2024, 15 (02) : 1365 - 1379
  • [33] Attack-resilient fault detection for interconnected systems under DoS attack
    Liu, Qidong
    Long, Yue
    Li, Tieshan
    Chen, C. L. Philip
    [J]. ISA TRANSACTIONS, 2024, 148 : 201 - 211
  • [34] Attack-Resilient Supervisory Control with Intermittently Secure Communication
    Wang, Yu
    Pajic, Miroslav
    [J]. 2019 IEEE 58TH CONFERENCE ON DECISION AND CONTROL (CDC), 2019, : 2015 - 2020
  • [35] GlobalTrust: An Attack-Resilient Reputation System for Tactical Networks
    Chen, Xin
    Cho, Jin-Hee
    Zhu, Sencun
    [J]. 2014 ELEVENTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2014, : 275 - 283
  • [36] Attack-resilient Fusion of Sensor Data with Uncertain Delays
    Chen, Yanfeng
    Zhang, Tianyu
    Kong, Fanxin
    Zhang, Lin
    Deng, Qingxu
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2022, 21 (04)
  • [37] Tunable Encrypted Deduplication with Attack-resilient Key Management
    Yang, Zuoru
    Li, Jingwei
    Ren, Yanjing
    Lee, Patrick P. C.
    [J]. ACM TRANSACTIONS ON STORAGE, 2022, 18 (04)
  • [38] Attack-Resilient Distributed Convex Optimization of Cyber-Physical Systems Against Malicious Cyber-Attacks Over Random Digraphs
    Feng, Zhi
    Hu, Guoqiang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 458 - 472
  • [39] Attack-Resilient State Estimation for Noisy Dynamical Systems
    Pajic, Miroslav
    Lee, Insup
    Pappas, George J.
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 82 - 92
  • [40] Attack-resilient time synchronization for wireless sensor networks
    Song, Hui
    Zhu, Sencun
    Cao, Guohong
    [J]. AD HOC NETWORKS, 2007, 5 (01) : 112 - 125