Chapter 22: Virtualization Security

Slides:



Advertisements
Similar presentations
1 VIRTUAL MACHINES By: Sai Siddharth Kumar Dantu.
Advertisements

Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
Introduction to Virtualization
CS-3013 & CS-502, Summer 2006 Virtual Machine Systems1 CS-502 Operating Systems Slides excerpted from Silbershatz, Ch. 2.
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 1: The new mainframe.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
ELEC6200, Fall 07, Oct 29 Westrom: Virtual Machines 1 Kenneth Westrom ELEC-6620.
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
Chapter 21: Mobile Virtualization Infrastracture and Related Security Issues Guide to Computer Network Security.
Virtual Machine Security Summer 2013 Presented by: Rostislav Pogrebinsky.
The Origin of the VM/370 Time-sharing system Presented by Niranjan Soundararajan.
5205 – IT Service Delivery and Support
Virtualization Technology Prof D M Dhamdhere CSE Department IIT Bombay Moving towards Virtualization… Department of Computer Science and Engineering, IIT.
Chapter 3.1:Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Chapter 3 Operating Systems Introduction to CS 1 st Semester, 2015 Sanghyun Park.
Virtualization Concept. Virtualization  Real: it exists, you can see it.  Transparent: it exists, you cannot see it  Virtual: it does not exist, you.
UNIX System Administration OS Kernal Copyright 2002, Dr. Ken Hoganson All rights reserved. OS Kernel Concept Kernel or MicroKernel Concept: An OS architecture-design.
Virtualization Lab 3 – Virtualization Fall 2012 CSCI 6303 Principles of I.T.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2010 Seminar #1 VIRTUALIZATION EVERYWHERE.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2009 Seminar #1 VIRTUALIZATION EVERYWHERE.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Ethical and Social...J.M.Kizza 1 Module 11: New Frontiers for Computer Ethics: Virtualization and Virtual Reality Virtualization History of Virtualization.
Understanding Operating Systems Flynn & McHoes
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Using Virtual Servers for the CERN Windows infrastructure Emmanuel Ormancey, Alberto Pace CERN, Information Technology Department.
Instruction Set Virtualization
Server Virtualization
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Virtual Infrastructure By: Andy Chau Farzana Mohsini Anya Mojiri Virginia Nguyen Bobby Phimmasane.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
Operating-System Structures
Lecture 1: Network Operating Systems (NOS) An Introduction.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
Virtual Machines Mr. Monil Adhikari. Agenda Introduction Classes of Virtual Machines System Virtual Machines Process Virtual Machines.
Course 03 Basic Concepts assist. eng. Jánó Rajmond, PhD
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
VIRTUALIZATION TECHNIQUES By:- Aman, Denis and Dharit.
4.1 Machines and Computational Models
Guide to Operating Systems, 5th Edition
Chapter 6: Securing the Cloud
Introduction to Operating Systems
Operating System & Application Software
Agenda Hardware Virtualization Concepts
Prepared by: Assistant prof. Aslamzai
Virtualization OVERVIEW
What is Virtualization Last Update
Introduction
3.2 Virtualisation.
Chapter 21: Virtualization Technology and Security
1. 2 VIRTUAL MACHINES By: Satya Prasanna Mallick Reg.No
Virtual Machines.
Group 8 Virtualization of the Cloud
Virtual Private Servers – Types of Virtualization platforms Virtual Private ServersVirtual Private Servers, popularly known as VPS is considered one of.
Introduction to Operating Systems
Virtualization Layer Virtual Hardware Virtual Networking
Virtualization Techniques
Operating Systems Bina Ramamurthy CSE421 11/27/2018 B.Ramamurthy.
Guide to Operating Systems, 5th Edition
LAB 01 Installation of VIRTUAL MACHINE and LINUX
Virtual machines benefits
Introduction to Virtual Machines
Introduction to Virtual Machines
Virtualization Dr. S. R. Ahmed.
Chapter 1: Introduction
Hypervisor A hypervisor or virtual machine monitor (VMM) is computer software, firmware or hardware that creates and runs virtual machines. A computer.
Presentation transcript:

Chapter 22: Virtualization Security Guide to Computer Network Security

Kizza - Guide to Computer Network Security Introduction Virtualization is a process through which one can create something that is there in effect and performance but not there in reality– that is virtual. It is a physical abstraction of the company computing resources like storage, network servers, memory and others. For computing systems, it is a process in which software creates virtual machines (VMs) including a virtual machine monitor called 'hypervisor,' that allocates hardware resources dynamically and transparently so that multiple operating systems, called “guest operating systems” can run concurrently on a single physical computer without even knowing. The potential power of virtualization in substantially increasing the performance of computing systems such as hardware and software through division of the underlying physical computing resources into many equally powerful virtual machines, has increased the popularity of the technology in the last twenty years and this love continues today. Kizza - Guide to Computer Network Security

History of Virtualization Computers of the 1960s could do only one task at a time and depended on human operators, increasing system performance was bottlenecked at two points: at the submission stage and at the computation stage. Batching improved system performance some but did not go far enough. In response to this growing need for speed up, IBM responded with the CP-40 main frame which later evolved into the CP-67 system, thought to be the first commercial Main Frame to support Virtualization. The CP-67 had a unique operating system combination consisting of CMS (Console Monitor System) piggybacked on a control program called rightly CP. The CP/CMS was a small single-user interactive operating system and CP, upon which CMS run, actually run on the Mainframe to create the Virtual Machines which individually run their own copies of CMS. To each virtual machine running CMS, CP allocated parts of the underlying physical machine which formed the virtual machine. Kizza - Guide to Computer Network Security

Virtualization Terminologies There are several terminologies used specifically in the virtualization process and they include host CPU and guest CPU, host operating system and guest operating system, hypervisor and emulation. Host CPU/Guest CPU - a virtual CPU, also known as a guest CPU, created by virtualization based on time slices of the underlying physical CPU, now called a host CPU on the host machine. Host OS/Guest OS – The virtualization process creates complete VMs based on the underlying physical machine. Each VM created, may or many not create a new/guest operating system or make as a copy of the physical/host operating system. The guest operating system has no knowledge of the existence of either the host operating system nor the siblings guest operating systems Kizza - Guide to Computer Network Security

Kizza - Guide to Computer Network Security Hypervisor - A hypervisor, as a virtual machine manager, is a software program that allows multiple operating systems to share a single physical hardware host. In creating the virtual machine for each operating system, the hypervisor uses “slices” of the physical host machine’s physical components like memory, processor and other resources to anchor each guest operating system running the virtual machine created. The host physical machine’s “slices” allocated to each virtual machine are managed by the hypervisor in amounts and time durations as needed by each operating system. Emulation - An emulation is a process of making an exact copy of all the functionalities of an entity like a hardware resource of a computing system like a CPU and operating system, I/O devices and drivers, and others. Emulation software runs on a host to emulate the host. Emulators can create guest OS. Kizza - Guide to Computer Network Security

Types of Computing System Virtualization There are many types of virtualization including platform, network, storage and application. Platform Virtualization - is the use of server hardware by the virtualization software to host multiple VMs as guest VMs. Each VM is a virtual environment with its operating system (the guest operating system), which may or may not be the same as the physical server’s operating system (the host operating system), emulates the whole physical infrastructure of a computing system including memory and each VM is independent of other VMs sharing the physical server. Platform virtualization itself is subdivided into two types: workstation and server: Workstation Virtualization Server Virtualization Kizza - Guide to Computer Network Security

Kizza - Guide to Computer Network Security Network Virtualization - Like storage virtualization, network virtualization pools the resources, like files, folders, storage and I/O devices, of separate and different networks into one network Storage Virtualization - is the process of pooling together of resources of many different network storage devices such as hard drives to create what looks like one big storage managed from a single console Application Virtualization – the process of allowing the bytecode of an application package to be portably run on many different computer architectures and operating systems through the use of running an interpreter or just-in-time compilation of the application before it runs on the computer architecture of choice. An example of this is the Java Machine Virtualization. Kizza - Guide to Computer Network Security

The Benefits of Virtualization Virtualization technology has had a long history and has brought to the computing community the following benefits: Reduction of Server Sprawl Conservation of Energy Reduced IT Management Costs Better Disaster Recovery Management Software Development Testing and Verification Isolation of Legacy Applications Cross-Platform Support Minimizing Hardware Costs Faster server provisioning Better Load Balancing Reduce the data centre footprint Increase uptime Isolate applications Extend the life of older applications Kizza - Guide to Computer Network Security

Virtualization Infrastructure Security Perhaps the greatest threat presented by virtualization to computer networks is the fact that using one physical computer, one can access many virtual infrastructure, a feat that not so feasible in the physical networks. Virtualization security should include: Hypervisor security Securing Communications Between Desktop and Virtual Infrastructure Security of Communication Between Virtual Machines Threats and Vulnerabilities Originating from a VM Kizza - Guide to Computer Network Security