SUBSYSTEM DEVELOPMENT FOR RESOURCE FREEING ATTACK SIMULATION IN VIRTUAL MACHINES BASED ON NETWORK FUNCTION VIRTUALIZATION ARCHITECTURE

SUBSYSTEM DEVELOPMENT FOR RESOURCE FREEING ATTACK SIMULATION IN VIRTUAL MACHINES BASED ON NETWORK FUNCTION VIRTUALIZATION ARCHITECTURE By Anak Agung Bagus Yoga Deva Mahesa NIM : 18118005 (Telecommunication Engineering Program) Virtualization services make it easy for users to run software rem...

Full description

Saved in:
Bibliographic Details
Main Author: A. Bagus Yoga Deva Mahesa, A.
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/66622
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
Description
Summary:SUBSYSTEM DEVELOPMENT FOR RESOURCE FREEING ATTACK SIMULATION IN VIRTUAL MACHINES BASED ON NETWORK FUNCTION VIRTUALIZATION ARCHITECTURE By Anak Agung Bagus Yoga Deva Mahesa NIM : 18118005 (Telecommunication Engineering Program) Virtualization services make it easy for users to run software remotely that is not directly integrated with hardware. Virtualization architecture can also provide security threats, such as software disruption due to limited available resources. One of these disturbances is the Resource Freeing Attack. RFA was detected in 2012, due to excessive workloads causing one of the resources to become a bottleneck. This attack provides losses, especially in server rental systems, because the allocated resources cannot be used optimally. To avoid this, we need a system that can be used to detect RFA, which is run in a virtualized environment. This system integrates the virtualization environment with the system for providing RFA warnings to attacked virtual machines. The system in the environment consists of an XCP - NG hypervisor as an operating system that runs VM - VM, XOA which is used for management and orchestration in the system, which then runs this VM as a web server so that the VM can be run to receive workloads. In the testing process, the system is monitored from the CPU and network bandwidth side along with the workload assigned to the VM. If testing for the CPU has been given until a bottleneck occurs, then the detection system works by looking at the CPU utilization level, then sending a notification through the monitor on the VM that is affected by the attack. Keywords: NFV, RFA, Virtual Machine