• Title/Summary/Keyword: 가상화 취약점

Search Result 50, Processing Time 0.032 seconds

A Communication technique between Cloud Server and Proposed Virtual Board (제안한 가상화 게시판과 클라우드 서버 간의 통신 기법)

  • Kim, Yongdug;Kim, Sangwook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.1335-1338
    • /
    • 2012
  • 클라우드 컴퓨팅 서비스는 정보의 접근을 위한 시간과 장소의 경계를 허물어 산업전반의 발전을 크게 이끌고 있지만 집중된 정보를 탈취하기 위한 해킹의 시도 또한 증가하고 있다. 특히 웹 기반의 클라우드 어플리케이션의 취약점을 통한 해킹이 주로 이루어진다. 가상화 게시판은 클라우드 서버에 등록되어 있는 프로시저 호출을 통해 동작하는 클라우드 가상화 어플리케이션이다. 본 논문은 가상화 게시판과 클라우드 서버의 통신을 위한 기술인 VaaS(Virtual as a Service)를 설계한다. 가상화 게시판을 통해 기술에 대한 설명과 검증결과를 제시한 후 클라우드 가상화 어플리케이션의 보안에 대한 기대효과에 대해 논의한다.

A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services (융합서비스를 위한 클라우드 컴퓨팅 환경에서 가상화 보안에 관한 연구)

  • Lee, Bo-Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.93-99
    • /
    • 2014
  • Cloud computing refers to borrow IT resources as needed by leveraging Internet technology and pay as much as you used by supporting real-time scalability depending on the service load. Virtualization which is the main technology of cloud computing is a technology that server, storage and hardware are regarded as not separate system but one system area and are allocated as needed. However, the security mechanisms provided by virtualized environments are difficult to cope with the traditional security mechanisms, having basic levels of visibility, control and audit function, on which the server is designed to monitor the traffic between the servers. In this paper, the security vulnerabilities of virtualization are analysed in the cloud computing environment and cloud virtualization security recommendations are proposed.

A Study on Vulnerability for Isolation Guarantee in Container-based Virtualization (컨테이너 기반 가상화에서 격리성 보장을 위한 취약성 고찰)

  • Dayun Yum;Dongcheon Shin
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.23-32
    • /
    • 2023
  • Container-based virtualization has attracted many attentions as an alternative to virtual machine technology because it can be used more lightly by sharing the host operating system instead of individual guest operating systems. However, this advantage may owe some vulnerabilities. In particular, excessive resource use of some containers can affect other containers, which is known as the noisy neighbor problem, so that the important property of isolation may not be guaranteed. The noisy neighbor problem can threat the availability of containers, so we need to consider the noisy neighbor problem as a security problem. In this paper, we investigate vulnerabilities on guarantee of isolation incurred by the noisy neighbor problem in container-based virtualization. For this we first analyze the structure of container-based virtualization environments. Then we present vulnerabilities in 3 functional layers and general directions for solutions with limitations.

Designing a vulnerability analysis system using natural language processing techniques in a cloud environment (클라우드 환경에서 자연어처리 기법을 활용한 취약점 분석 시스템 설계)

  • Song, Jin-Su;Lee, Pil-Won;Shin, Young-Tea
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.122-124
    • /
    • 2021
  • 최근 4차 산업혁명의 기술이 발전하며 인공지능과 클라우드 컴퓨팅의 융합에 대한 연구가 활발하게 진행되고 있으며 클라우드 컴퓨팅에 컨테이너 기술을 접목한 새로운 컴퓨팅 환경이 주목받고 있다. 그러나 현재 사용되고 있는 컨테이너 기반의 가상화 기술은 컨테이너 실행에 필요한 파일과 설정 값을 포함하고 있는 컨테이너 이미지를 통해 배포하는 방식을 사용하고 다수의 컨테이너가 하나의 커널을 공유하기 때문에 취약한 패키지를 사용하는 컨테이너 이미지가 다수의 사용자와 공유 되어 시스템 보안이 매우 취약하다 이에 본 논문에서는 자연어처리 기법을 활용한 취약점 분석 시스템을 통해 컨테이너를 실행에 필요한 파일과 설정 값을 포함하고 있는 컨테이너 이미지에서 취약점을 분석하는 시스템을 제안한다.

Cloud computing Issues and Security measure (클라우드 컴퓨팅 보안 대책 연구)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.31-35
    • /
    • 2015
  • Cloud computing is internet-based computing technology. This is a form for exchanging service focused on the Internet. Because Cost is saved and use is easy there's a tendency that many companies are using. Cloud is in the form of a public cloud and private cloud and hybrid cloud. The service model is SaaS, PaaS, IaaS. Cloud computing use is simple but it has a security vulnerability. In particular, there is a vulnerability in virtualization and centralized information. In order to overcome this new security technology is to be developed. In particular, network security technology and authentication technology should be developed. Another way to overcome security responsibilities must be clearly and policies should be unified.

  • PDF

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Advanced Intrusion Tolerant System based on Exposure Policy and Virtualization Technology (가상화 기술 및 노출 정책을 기반으로 한 향상된 침입 감내 시스템 제안)

  • Kim, Hee-Young;Lee, Jung-Min;Heo, Seon-Dong;Yoon, Hyun-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.248-250
    • /
    • 2012
  • 사이버 공격이 다양해지면서 침입 탐지 시스템이 탐지 못하는 공격들이 늘어가고 그에 따라서 침입 감내 시스템의 필요성이 대두되고 있다. 기존의 가상화 기반 침입 감내 시스템들은 같은 가상 이미지를 정화해서 사용하므로 항상 같은 취약점을 가지고 있게 된다. 이 논문에서는 기존의 가상화 기반 침입 감내 시스템의 보안상 문제점을 지적하고 해결하기 위한 아이디어를 제시한다. 그리고 각 가상 이미지에 부여된 점수를 기반으로 노출 우선 순위를 배정하는 정책을 제안한다.

Analysis of cloud computing security technology trends (클라우드 컴퓨팅 보안 기술 동향 분석)

  • Kim, Seong-Jong;Song, Jun-Ho;Han, Min-Ki;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.785-788
    • /
    • 2012
  • 클라우드 컴퓨팅의 핵심인 가상머신에 대한 보안 기술 연구들을 계속 진행하고 있다. 기업들은 다양한 클라우드 서비스를 제공하고 있지만, 기존 가상화 기술의 취약점과 더불어 서비스를 하기 때문에 여러 가지 보안 위협들이 나타나고 있으며, 악성코드 및 바이러스 공격으로 가상 컴퓨팅 서비스 거부, 정보 유출, 비인가 사용자에 대한 보안 위협 또한 심각하다. 따라서 본 논문에서는 클라우드 컴퓨팅 환경의 가상화 내에서 발생하는 보안 위협들과 이를 탐지 및 차단하기 위한 보안 기술과 앞으로 연구 해야할 클라우드 가상화 보안 연구 대해 대해 알아본다.

Container Vulnerability Intruder Detection Framework based on Memory Trap Technique (메모리 트랩기법을 활용한 컨테이너 취약점 침입 탐지 프레임워크)

  • Choi, Sang-Hoon;Jeon, Woo-Jin;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.3
    • /
    • pp.26-33
    • /
    • 2017
  • Recently container technologies have been receiving attention for efficient use of the cloud platform. Container virtualization technology has the advantage of a highly portable, high density when compared with the existing hypervisor. Container virtualization technology, however, uses a virtualization technology at the operating system level, which is shared by a single kernel to run multiple instances. For this reason, the feature of container is that the attacker can obtain the root privilege of the host operating system internal the container. Due to the characteristics of the container, the attacker can attack the root privilege of the host operating system in the container utilizing the vulnerability of the kernel. In this paper, we propose a framework for efficiently detecting and responding to root privilege attacks of a host operating system in a container. This framework uses a memory trap technique to detect changes in a specific memory area of a container and to suspend the operation of the container when it is detected.

Cloud Security Technology and Vulnerability Assessment (클라우드 보안 기술과 취약점 분석)

  • Kim, A-Yong;Lee, Sung-Ock;Ryu, Seung-Han;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.690-692
    • /
    • 2013
  • Cloud computing is an Internet-based technology, one of the Big Data era aspiring technology. Bring on the internet whenever you need to use multiple physical servers into one virtual server, cloud Cloud technology and large companies, such as leading U.S. IT company, Amazon, IBM, Google, Microsoft and the domestic firm Samsung, SK, KT, NHN the cloud market at home and abroad, and commercialization by investing in the future to continue to grow. The main reason for the introduction of the cloud and reduced operating costs, and to see the most problems is the leakage of personal information. In this paper, we propose a method to improve the security and vulnerability analysis of security technologies and cloud.

  • PDF