phasize the need for a project such as ours. Another
way to detect zombies is by using an introspection
solution, such as libvmi (Payne, 2012) or NSX (Pettit
et al., 2018), or software inside the VM (Kiperberg
et al., 2019). The memory can later be analyzed us-
ing tools such as rekall (Block and Dewald, 2017) or
volatility (Graziano et al., 2013). While these sys-
tems may provide all the required components to de-
tect zombies, they do not include a unique tool and
some hacking may be required. In addition, the per-
formance cost is quite significant. The system oper-
ated using Linux servers and workstations, but with
the exception of new tests and the inspection mod-
ule the system can operate equally as well using Win-
dows, OS X, MVS, or any other enterprise operating
system.
5 CONCLUSIONS
We presented HERO, a system designed to locate and
identify zombie VMs running on the inspected host or
cluster. We have used HERO on KVM environments,
though the system can be ported easily to Hyper-V,
ESXi, Acropolis, and Xen.
We designed and developed HERO, a system to
locate and identify zombie VMs on the inspected host
or cluster. By deploying HERO in a virtual server en-
vironment, we found that HERO could successfully
locate VMs and improve zombie detection accuracy
through the Training Module, thus validating our ap-
proach and use of machine learning.
Unfortunately, we could not access a live data
center to experiment on and, therefore, had to esti-
mate the common zombie characteristics based on our
knowledge and experience with real-life production
environments. Because HERO cannot definitively
verify which VMs are zombies, system administrators
must still confirm which VMs to deactivate. How-
ever, with further development, HERO could prove to
be an invaluable tool for system administrators, em-
powering them to quickly and accurately track down
zombie machines and, thus, optimize computing ca-
pacity and save costs.
ACKNOWLEDGEMENTS
We thank the College of Management, Academic
Studies, for a research grant that allowed us to de-
velop and test the system described in this paper.
REFERENCES
Belanger, S. and Casemore, B. ”exploring the impact of
infrastructure virtualization on digital transformation
strategies and carbon emissions” an idc white paper,
sponsored by vmware.
Bila, N., de Lara, E., Joshi, K., Lagar-Cavilla, H. A.,
Hiltunen, M., and Satyanarayanan, M. (2012). Jet-
tison: Efficient idle desktop consolidation with par-
tial vm migration. In Proceedings of the 7th ACM eu-
ropean conference on Computer Systems, pages 211–
224.
Block, F. and Dewald, A. (2017). Linux memory forensics:
Dissecting the user space process heap. Digital Inves-
tigation, 22:S66–S75.
Carroll, M., Kotz
´
e, P., and Van der Merwe, A. (2011). Se-
cure virtualization: benefits, risks and constraints.
Cohen, N. and Bremler-Barr, A. Graph-based cloud re-
source cleanup.
Colman-Meixner, C., Develder, C., Tornatore, M., and
Mukherjee, B. (2016). A survey on resiliency tech-
niques in cloud computing infrastructures and appli-
cations. IEEE Communications Surveys & Tutorials,
18(3):2244–2281.
Fesl, J., Gokhale, V., and Feslov
´
a, M. (2019). Efficient vir-
tual machine consolidation approach based on user in-
activity detection. CLOUD COMPUTING 2019, page
115.
Galante, G. and de Bona, L. C. E. (2012). A survey on
cloud computing elasticity. In 2012 IEEE Fifth Inter-
national Conference on Utility and Cloud Computing,
pages 263–270. IEEE.
Georgiou, S., Tsakalozos, K., and Delis, A. (2013). Ex-
ploiting network-topology awareness for vm place-
ment in iaas clouds. In 2013 International Confer-
ence on Cloud and Green Computing, pages 151–158.
IEEE.
Graziano, M., Lanzi, A., and Balzarotti, D. (2013). Hyper-
visor memory forensics. In International Workshop on
Recent Advances in Intrusion Detection, pages 21–40.
Springer.
Großmann, M. and Schenk, C. (2018). A comparison of
monitoring approaches for virtualized services at the
network edge. In 2018 International Conference on
Internet of Things, Embedded Systems and Communi-
cations (IINTEC), pages 85–90. IEEE.
Habib, I. (2008). Virtualization with kvm. Linux Journal,
2008(166):8.
Hernantes, J., Gallardo, G., and Serrano, N. (2015).
It infrastructure-monitoring tools. IEEE Software,
32(4):88–93.
Kedia, P., Nagpal, R., and Singh, T. P. (2013). A survey on
virtualization service providers, security issues, tools
and future trends. International Journal of Computer
Applications, 69(24).
Kim, I. K., Zeng, S., Young, C., Hwang, J., and Humphrey,
M. (2016). A supervised learning model for identi-
fying inactive vms in private cloud data centers. In
Proceedings of the Industrial Track of the 17th Inter-
national Middleware Conference, pages 1–7.
MODELSWARD 2021 - 9th International Conference on Model-Driven Engineering and Software Development
244