• Title/Summary/Keyword: 가상화 취약점

Search Result 50, Processing Time 0.028 seconds

클라우드 컴퓨팅 환경의 가상화 기술 취약점 분석연구

  • Kim, Ji-Yeon;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Myung-Joo
    • Review of KIISC
    • /
    • v.19 no.4
    • /
    • pp.72-77
    • /
    • 2009
  • 가상화 기술은 클라우드 컴퓨팅의 핵심 기술로서 서버 및 스토리지, 하드웨어 등을 분리된 시스템이 아닌 하나의 자원 영역으로 간주하여 자원을 필요에 따라 할당할 수 있다. 클라우드 컴퓨팅 환경에서는 가상화 기술을 통해 자원을 통합하여 활용을 극대화하고, 운영비용 절감 및 공간절약의 효과를 얻을 수 있다. 그러나 가상화 가술을 제공하는 가상화 소프트웨어의 경우, 소프트웨어 자체에서 발생할 수 있는 보안 취약점이 존재하게 되고, 이를 이용한 보안 위협 요소는 가상화 환경 기반의 클라우드 컴퓨팅 서비스의 신뢰도를 저하시킬 수 있다. 본 논문에서는 가상머신(VM : Virtual Machine)이 갖는 취약점 분석을 통하여 가상화 환경에서 발생 가능한 보안 위협을 정의하고, 분석 결과를 기반으로 클라우드 컴퓨팅의 가상화 환경에서 고려해야할 보안 문제 및 대응 방안을 기술한다.

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

An Efficient Agent Framework for Host-based Vulnerability Assessment System in Virtualization Environment (가상화 환경에서 호스트 기반 취약점 분석 시스템을 위한 효율적인 에이전트 프레임워크)

  • Yang, Jin-Seok;Chung, Tai-Myoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.1
    • /
    • pp.23-30
    • /
    • 2014
  • In this paper, we propose an efficient agent framework for host-based vulnerability assessment system by analyzing the operational concept of traditional vulnerability assessment framework and proposed vulnerability assessment agent framework in virtualization environment. A proposed agent framework have concept by using the features of virtualization technology, it copy and execute checking agent in targeted virtual machines. In order to embody a propose agent framework, we design function block of checking agent and describe a vulnerability checking scenario of proposed agent framework. Also we develop pilot system for vulnerability checking scenario. We improve the shortcomings of the traditional vulnerability assessment system, such as unnecessary system load of the agent, inefficiency due to duplication agent installation. Moreover, the proposed agent framework is maximizing the scalability of the system because there is no agent installation when adding a targeted system.

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

클라우드 컴퓨팅 환경에서의 가상화 악성코드

  • Choi, Ju-Young;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Myung-Joo
    • Review of KIISC
    • /
    • v.20 no.2
    • /
    • pp.44-50
    • /
    • 2010
  • 가상화는 컴퓨팅 자원의 최적화를 지원하고 사용자에게 동일한 환경을 제공하는 기술이다. 이러한 가상화 기술은 클라우드 컴퓨팅 환경의 핵심 기술로 사용되고 있다. 그러나 가상화 환경을 구축하는 소프트웨어는 취약점을 가짐으로 감염된 가상환경은 게스트 OS와 물리적 컴퓨팅 지원 천체에 커다란 파급효과를 가져오게 된다. 본 논문은 가상화 개요와 가상화 네트워크 구조를 설명하고, 가상환경에서 발생 가능한 6가지 위협에 대하여 분류한다. 또한 가상화 환경에서의 악성코드 루트킷(rootkit)인 Blue Pill과 SubVirt의 동작원리에 대하여 기술한다.

Cloud Computing Virtualization: It's Security Issues and Vulnerability (클라우드 컴퓨팅 가상화 기술: 보안이슈 및 취약점)

  • Kang, Dea-Hoon;Kim, Sang-Gu;Kim, HyunHo;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.234-237
    • /
    • 2014
  • The increasing of Cloud Computing technology among several companies has been a key strategy for IT services to provide desirable IT solutions to consumers of cloud services. More attention is concentrated to these core technologies that enable cloud services and more particularly to the virtualization aspect. The accessibility to a larger number of users is possible because of the usage of the data-intensive, data management and data integrity. Unfortunately, those useful services are vulnerable to kind of attacks by hackers, thus the security of personal information is in critical situation. To solve this to leakage vulnerability, and with the proliferation of cloud services, the cloud service providers adopt a security system with firewall, antivirus software and a large number of virtualized servers and Host. In this paper, a variety of virtualization technologies, threats and vulnerabilities are described with a complement of different security solutions as countermeasures.

  • PDF

A Study on the Virtualization and Security Technology for the Operation of Novel Reliable Networks (새로운 신뢰 망 운영을 위한 가상화 및 보안 기술에 관한 연구)

  • Jang, Jung-Sook;Jeon, Yong-Hee
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.1-12
    • /
    • 2015
  • In this paper, we analyze the research trend and problems of the existing virtualization technology and present the most applicable virtualization technology in order to apply the technology to the operation of novel reliable networks. By using the virtualization technology, there is advantage in that the utilization of resource becomes higher and maintenance cost goes down. While, from the security perspective, there exist advantage in using the virtualization, it also introduces new vulnerabilities due to the adoption. Thus it is necessary to analyze the problem and establish the strategy to solve it. Therefore we derive threat elements to the virtualized system, analyze and describe the virtualization security policy.

Design and Implementation of Web Server Security System using Virtualization (가상화를 이용한 웹 서버 보안시스템 설계 및 구현)

  • Yoo, Jae-Hyung;Kim, Do-Hyung;Kim, Yong-Ho;Ha, Ok-Hyun;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.199-207
    • /
    • 2008
  • Web service has many security weekness because it is exposure to outside and connected with various application. Especially, as new technology developed new type of security weakness has occured consistently. In this paper, we construct webserver and honeyweb by using virtual reality on a basis these weakness. So it cannot be influenced by any attack to the hardware of the system. By using honey web, it disigned and embodied web server secutiry system to collect the data about new attack. Through this, it can provide proper secutiry in a web environment of mutual communication.

  • PDF

Nested Virtualization Scheme for the Secure Cloud Computing Environment (안전한 클라우드 컴퓨팅 환경을 위한 중첩 가상화 기법)

  • Kim, Inhyeok;Kim, Junghan;Eom, Young Ik
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.83-84
    • /
    • 2013
  • 클라우드 컴퓨팅을 이용하여 다양한 서비스가 생겨남에 따라 클라우드 컴퓨팅 환경에서의 보안이 더욱 중요해지고 있다. 이에 따라 클라우드 컴퓨팅을 구축하는 핵심 기술인 가상화 기술의 보안 또한 중요한 이슈가 되고 있다. 가상화 기술은 독립된 컴퓨팅 환경을 제공함으로써 기본적으로 안전한 컴퓨팅 환경을 제공하지만 가상화 기술의 보안 취약점을 이용하여 보안 공격하는 사례가 증가하고 있다. 이에 본 논문에서는 전가상화 기법과 운영체제 레벨 가상화 기법을 접목시켜 게스트 운영체제로부터 시작되는 보안 공격에 대해 대응할 수 있게 함으로써 보안성을 강화시키는 기법을 제안한다. 또한, 벤치마킹을 통해 이러한 접근방법이 기존의 컴퓨팅 성능에 거의 영향을 미치지 않음을 확인하였다.

  • PDF

Cloud Computing Security Trends (클라우드 컴퓨팅 보안 동향)

  • Lee, Seokcheol;Shon, Taeshik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1111-1114
    • /
    • 2012
  • 최근 각광받고 있는 가상화 서비스 기술은 클라우드 컴퓨팅 기술에는 기존 IT환경에서 존재하던 보안 취약성뿐만 아니라, 서비스 적인 측면과 환경적인 측면에서 보안 취약점이 존재한다. 클라우드 컴퓨팅은 사회 여러분야에 적용되어 사용되므로, 보안 기술 적용의 중요성은 매우 크다. 본 논문에서는 클라우드 컴퓨팅 기술 보안 취약점의 서베이와 클라우드 컴퓨팅 보안 기술 표준화 및 개발 동향에 대해 살펴보고 클라우드 컴퓨팅 보안 연구가 향후 어떤 방향으로 진행되어야 하는지 제시할 것이다.