SUBSYSTEM DEVELOPMENT FOR RESOURCE FREEING ATTACK SIMULATION IN VIRTUAL MACHINES BASED ON NETWORK FUNCTION VIRTUALIZATION ARCHITECTURE
SUBSYSTEM DEVELOPMENT FOR RESOURCE FREEING ATTACK SIMULATION IN VIRTUAL MACHINES BASED ON NETWORK FUNCTION VIRTUALIZATION ARCHITECTURE By Anak Agung Bagus Yoga Deva Mahesa NIM : 18118005 (Telecommunication Engineering Program) Virtualization services make it easy for users to run software rem...
Saved in:
Main Author: | |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/66622 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | SUBSYSTEM DEVELOPMENT FOR RESOURCE FREEING
ATTACK SIMULATION IN VIRTUAL MACHINES BASED ON
NETWORK FUNCTION VIRTUALIZATION ARCHITECTURE
By
Anak Agung Bagus Yoga Deva Mahesa
NIM : 18118005
(Telecommunication Engineering Program)
Virtualization services make it easy for users to run software remotely that is not
directly integrated with hardware. Virtualization architecture can also provide
security threats, such as software disruption due to limited available resources. One
of these disturbances is the Resource Freeing Attack. RFA was detected in 2012,
due to excessive workloads causing one of the resources to become a bottleneck.
This attack provides losses, especially in server rental systems, because the
allocated resources cannot be used optimally. To avoid this, we need a system that
can be used to detect RFA, which is run in a virtualized environment. This system
integrates the virtualization environment with the system for providing RFA
warnings to attacked virtual machines. The system in the environment consists of
an XCP - NG hypervisor as an operating system that runs VM - VM, XOA which is
used for management and orchestration in the system, which then runs this VM as
a web server so that the VM can be run to receive workloads. In the testing process,
the system is monitored from the CPU and network bandwidth side along with the
workload assigned to the VM. If testing for the CPU has been given until a
bottleneck occurs, then the detection system works by looking at the CPU utilization
level, then sending a notification through the monitor on the VM that is affected by
the attack.
Keywords: NFV, RFA, Virtual Machine |
---|