This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments
May/June 2011 (vol. 13 no. 3)
pp. 18-23
John Quan, University of Alaska Fairbanks
Kara Nance, University of Alaska Fairbanks
Brian Hay, University of Alaska Fairbanks

Applying a mutualistic security service model to large-scale virtualized environments that rely on contributed hardware lets researchers improve security in exchange for resources. The authors discuss this model in the context of the Global Environment for Network Innovation (GENI) project.

1. "GENI System Overview," BNN Technologies, GENI-SE-SY-SO-02.0, Sept. 2008; http://groups.geni.net/geni/attachment/wiki/ GeniSysOvrvwGENISysOvrvw092908.pdf.
2. T. Garfinkel and M. Rosenblum, "A Virtual Machine Introspection Based Architecture for Intrusion Detection," Proc. 10th Ann. Symp. Network and Distributed System Security (NDSS 2003), The Internet Soc., 2003, pp. 191–206.
3. B. Hay and K. Nance, "Forensics Examination of Volatile System Data Using Virtual Introspection," SIGOPS Operating Systems Review, vol. 42, no. 3, 2008, pp. 74–82; doi.acm.org/10.1145/1368506.1368517.
4. K. Nance, M. Bishop, and B. Hay, "Virtual Machine Introspection: Observation or Interference?" IEEE Security & Privacy, vol. 6, no. 5, 2008, pp. 32–37.
1. "FIRE: Future Internet Research and Experimentation," white paper, FIREworks Consortium, Aug. 2009; www.ict-fireworks.eu/fileadmin/documents FIRE_White_Paper_2009_v3.1.pdf.
2. S. Shimojo, "JGN2plus: A Testbed Designed for New Generation Network R&D," JGN2plus, Aug. 2008; www.jgn.nict.go.jp/japanese/data/pdf/SPARC OT-200808-shimojo.pdf.
3. H. Kenyon, "Defense Researchers Developing National Cyber Test Range," Signal Online, May 2009; www.afcea.org/signal/articles/templatesSIGNAL_Article_Template.asp?articleid=1928 .

Index Terms:
Information technology, Global Environment for Network Innovation (GENI), Virtual Machine Introspection (VMI), mutualistic security service (MSS) model
Citation:
John Quan, Kara Nance, Brian Hay, "A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments," IT Professional, vol. 13, no. 3, pp. 18-23, May-June 2011, doi:10.1109/MITP.2011.36
Usage of this product signifies your acceptance of the Terms of Use.