摘要(英) |
In order to make more effective use of CPU performance, virtualization has also become more and more widely used and very easy to build, it is a common situation to perform multiple virtual machines simultaneously on a physical host, virtual network composed of multiple virtual machines comes also, Layer 2 attacks also appeared on these virtual networks, for example ARP spoofing, MAC spoofing attacks. Because the virtual machine has packing features, lot of packed virtual machines can be downloaded at INTERNET, user can directly provision those packed virtual machines to physical host, we can′t ensued these is no any malicious software packed in the virtual machine, therefore the virtual machine download from INTERNET is un-trustable, above reasons made us want to implement a system in Linux KVM, verify the feasibility of a Layer 2 protection detection system that does not require complex settings, and take the detection and protection of ARP spoofing as the first practical item. |
參考文獻 |
[1] D. Plummer, An Ethernet Address Resolution Protocol (RFC826), 1982
[2] QEMU. Available: http://wiki.qemu.org/Main_Page
[3] VMware: Understanding Full Virtualization, Paravirtualization, and Hardware Assist:https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/techpaper/VMware_paravirtualization.pdf
[4] libvirt: The virtualization API. Available: http://libvirt.org/index.html
[5] 陳信宏,”The Fault Tolerant KVM implementation”,p6, 國立中央大學, 碩
士論文, 2014
[6] Dac-Nhuong Le, Raghvendra Kumar, Gia Nhu Nguyen, Jyotir Moy Chatterjee, Cloud Computing and Virtualization, John Wiley & Sons, Inc., 2018
[7] Jonas Andre, Johannes Naab∗,” Open vSwitch Configuration for Separation of KVM/libvirt VMs”, Technical University of Munich, 2019
[8] xvisor: http://wiki.csie.ncku.edu.tw/embedded/xvisor
[9] Qemu JIT Code Generator and System Emulation: https://www.slideshare.net/jserv/qemu-jit-code-generator-and-system-emulation
[10] KVM (Kernel-based Virtual Machine) + KQEMU: http://benjr.tw/3631
[11] Roopa Govind , Mamatha T, “Validating The CPU Usage Statistics Provided By Linux KVM Hypervisor”, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY, Vol. 02, Issue 04, IJERT, April 2013
[12] Ankit Anand, Mohit Dhingra, J. Lakshmi, S. K. Nandy, “Resource usage monitoring for KVM based virtual machines”, Advanced Computing and Communications, IEEE, Dec. 2012
[13] Kernel-based Virtual Machine: http://benjr.tw/3620
[14] Virtualization 虛擬化: http://benjr.tw/3383
[15] QEMU machine emulator (Ubuntu): http://benjr.tw/96243
[16] THE TCP/IP GUIDE: http://www.tcpipguide.com/index.htm
[17] WIKI: ARP spoofing: https://en.wikipedia.org/wiki/ARP_spoofing
[18] D. Bruschi, A. Ornaghi, E. Rosti, “S-ARP: a Secure Address Resolution Protocol”, ACSAC, IEEE, 2003
[19] Cristina L. Abad ; Rafael I. Bonilla, “An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks”, ICDCSW′07, IEEE, 2007
[20] Todd Lammle著, CCNA認證教戰手冊, 林慶德, 陳宇芬 譯, 旗標出版股份有限公司, 台北市, 2011
[21] Yuksel Arslan, “A solution for ARP spoofing: Layer-2 MAC and protocol filtering and arpserver”, 2017
[22] Vagrant: https://www.vagrantup.com/intro |