lowing interesting results: The ping measurement as
shown by (K¨onig and Steinmetz, 2011) have not only
characteristic patterns for the VM itself, but also for
the hypervisor servers. Not only a migration, but also
a copy process of a file, as performed with SCP, leaves
a characteristic trace, and so will other network activ-
ities. Only the unanswered pings are unique in com-
bination with the other two characteristics. If a high
monitoring interval is not possible, our approach can
detect a migration process after its execution.
8 CONCLUSIONS
In this paper, we presented the first taxonomy of
VM live migration detection, showing different ap-
proaches that were categorized in two general groups.
Only the delay measurement approach allows a detec-
tion during the first migration phase, i.e., during the
copying of memory. This is the only way to prevent
the migration process. Nevertheless, a detection after
migration has finished is also very valuable in order
to prevent further damage.
We proposed a hybrid external approach that com-
prises an ICMP ping detection and a time-lag detec-
tion using NTP. Our approach has been tested us-
ing a prototype on different testbed configurations to
show the suitability of our hybrid external detection
approach. This applies especially to the detection of
migrations when using a low monitoring interval and
having certainty in cases where ICMP ping character-
istics have another origin than a VM live migration.
Further issues have to be addressed in future work.
The mobile IP scenario has to be thoroughly tested
and attacker scenarios have to be evaluated against the
prototype. Especially, the specifics of different server
types, e.g., video servers or webshop servers, could
be used to create even more improved monitoring ap-
proaches. In specific terms, that means that mecha-
nisms providing a correct classification for migration
cases and non-migration cases even while using low
monitoring intervals, are needed. In this field, tests
with machine learning have been performed, but their
applicability is very restricted. Finally, experiments
in real cloud environments, e.g., Amazon EC2, have
to be conducted. In this paper, we focused on the
scenario of VM theft; however, the case of copying
VM data without actually migrating the original VM
leaves even less possibilities for detection. Therefore,
more advanced detection approaches which also ad-
dress this aspect must be developed.
REFERENCES
Akoush, S., Sohan, R., Rice, A., Moore, A., and Hopper,
A. (2010). Predicting the Performance of Virtual Ma-
chine Migration. In IEEE International Symposium
on Modeling, Analysis Simulation of Computer and
Telecommunication Systems (MASCOTS’10), pages
37–46.
Broomhead, T., Cremean, L., Ridoux, J., and Veitch, D.
(2010). Virtualize Everything but Time. In Proceed-
ings of the 9th Conference on Operating Systems De-
sign and Implementation (OSDI’10), pages 1–6.
Clark, C., Fraser, K., Hand, S., Hansen, J. G., Jul, E.,
Limpach, C., Pratt, I., and Warfield, A. (2005). Live
Migration of Virtual Machines. In Proceedings of the
2nd Symposium on Networked Systems Design and
Implementation (NSDI’05), pages 273–286.
Ferrie, P. (2006). Attacks on Virtual Machine Emulators.
Symantec Security Response.
Gottron, C., Fiebig, S., K¨onig, A., Reinhardt, A., and Stein-
metz, R. (2012). Visualizing the Migration Process
of Virtual Machines. In Proceedings of the 12th Eu-
roview.
K¨onig, A. and Steinmetz, R. (2011). Detecting Migration
of Virtual Machines. In Proceedings of the 11th Eu-
roview.
Nirschl, J. (2011). Virtualized guest live migration profil-
ing and detection. Graduate Theses and Dissertations.
Paper 12055.
Oberheide, J., Cooke, E., and Jahanian, F. (2008). Empir-
ical Exploitation of Live Virtual Machine Migration.
BlackHat DC convention.
Silvera, E., Sharaby, G., Lorenz, D., and Shapira, I. (2009).
IP Mobility to Support Live Migration of Virtual Ma-
chines Across Subnets. In Proceedings of SYSTOR
2009: The Israeli Experimental Systems Conference
(SYSTOR’09), pages 13:1–13:10.
Sonnek, J. and Chandra, A. (2009). Virtual Putty: Reshap-
ing the Physical Footprint of Virtual Machines. In
Proceedings of the 2009 conference on Hot topics in
cloud computing (HotCloud’09).
Tsai, H.-Y., Siebenhaar, M., Miede, A., Huang, Y., and
Steinmetz, R. (2012). Threat as a Service?: Virtu-
alization’s Impact on Cloud Security. IT Professional,
14(1):32–37.
Wang, W., Zhang, Y., Lin, B., Wu, X., and Miao, K.
(2010). Secured and Reliable VM Migration in Per-
sonal Cloud. In 2nd International Conference on
Computer Engineering and Technology (ICCET’10),
pages 705–709.
Xia, Y., Liu, Y., Chen, H., and Zang, B. (2012). Defend-
ing against VM Rollback Attack. In IEEE/IFIP 42nd
International Conference on Dependable Systems and
Networks Workshops (DSN-W’12), pages 1–5.
CLOSER2013-3rdInternationalConferenceonCloudComputingandServicesScience
488