Skip to main content

Advertisement

Log in

A Performance Evaluation of Resilient Server with a Self-Repair Network Model

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

One of the essential parts of the cloud infrastructure is a computer server. Therefore, we need to preserve the computer server from failure, such as hang, denial of service and malware. Today, the data center (a collection of computer servers) has been shifting from traditional to an era of virtualization technology. Since we use virtualization for our server, a popular technique to monitor our server condition is Virtual Machine Introspection (VMI). There are two types of VMI: in-VMI and out-VMI. This paper presents the performance evaluation of a resilient server that we built by combining virtualization technology and a self-repair network model in which represents the in-VMI. The experiment results revealed that the performance of our proposed method has low performance losses and high service availability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. https://github.com/llaera/slowloris.pl

  2. https://www.clamav.net

  3. https://github.com/kdlucas/byte-unixbench

  4. https://github.com/shekyan/slowhttptest

  5. http://www.cvedetails.com/cve/CVE-2007-6750/

References

  1. Spiceworks Inc. (2016) Server virtualization and OS trends. [Online]. https://community.spiceworks.com/networking/articles/2462-server-virtualization-and-os-trends

  2. Rosenblum M, Garfinkel T (2005) Virtual machine monitors: current technology and future trends. Computers 38(5):39–47

    Article  Google Scholar 

  3. Garfinkel T, Rosenblum M (2003) A virtual machine introspection based architecture for intrusion detection. In: Network and Distributed Systems Security Symposium, p 191–206

  4. Hebbal Y, Laniepce S, Menaud J-M (2015) Virtual machine introspection: techniques and application. In: Availability, Reliability and Security (ARES), 2015 10th International Conference, p 676–685

  5. He S, Ghanem M, Guo L, Guo Y (2013) Cloud resource monitoring for intrusion detection. In: Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference, vol. 2, p 281–284

  6. Winarno I, Okamoto T, Hata Y, Ishida Y (2016) A resilient server based on virtualization with a self-repair network model. IJICIC 12(4):1059–1071

    Google Scholar 

  7. Winarno I, Ishida Y (2015) Simulating resilient server using XEN virtualization. Procedia Comput Sci 60:1745–1752

    Article  Google Scholar 

  8. Okamoto T, Sano F, Winarno I, Hata Y, Ishida Y (2017) Implementation and evaluation of an intrusion-resilient system for a DNS Service. IJICIC 13(5):1735–1749

  9. Sano F, Okamoto T, Winarno I, Hata Y, Ishida Y (2016) A cyber attack-resilient server inspired by biological diversity. AROB 21(3):345–350

    Google Scholar 

  10. Okamoto T, Tarao M (2016) Toward an artificial immune server against cyber attack. AROB 21(3):351–356

  11. Ishida Y (2015) Self-repair networks: a mechanism design, vol 101. Springer, New York

    MATH  Google Scholar 

  12. Jerne NK (1973) The immune system. Sci Am 229(1):52–60

    Article  Google Scholar 

  13. Pham C, Estrada ZJ, Cao P, Kalbarczyk Z, Iyer RK (2014) Building realible and secure virtual machines using architectural invariants. IEEE Security & Privacy 12(5):82–85

    Article  Google Scholar 

  14. Pham C, Estrada ZJ, Cao P, Kalbarczyk Z, Iyer RK (2014) Reliability and security monitoring of virtual machines using hardware architectural invariants. In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, p 13–24

Download references

Acknowledgments

This study has been supported by DIKTI (Directorate General of Higher Education, Indonesia) under contract number 242.7/E4.4/2014.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Idris Winarno.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Winarno, I., Ishida, Y. & Okamoto, T. A Performance Evaluation of Resilient Server with a Self-Repair Network Model. Mobile Netw Appl 24, 1095–1103 (2019). https://doi.org/10.1007/s11036-018-1103-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-1103-2

Keywords

Navigation