Protecting host-based intrusion detectors through virtual machines
نویسندگان
چکیده
Intrusion detection systems continuously watch the activity on a network or computer, looking for attack and intrusion evidences. However, host-based intrusion detectors are particularly vulnerable, as they can be disabled or tampered by successful intruders. This work proposes and implements an architecture model aimed to protect host-based intrusion detectors, through the application of the virtual machine concept. Virtual machine environments are becoming an interesting alternative for several computing systems due to their advantages in terms of cost and portability. The architecture proposed here makes use of the execution spaces separation provided by a virtual machine monitor, in order to separate the intrusion detection system from the system under monitoring. As a consequence, the intrusion detector becomes invisible and inaccessible to intruders. The prototype implementation and the tests performed show the viability of this solution. 2006 Elsevier B.V. All rights reserved.
منابع مشابه
Host-based Defense-in-depth Intrusion Detection in a Virtual Networking Environment
Cloud computing has emerged as promising future computing paradigm which provides plethora of services to users. Nevertheless, the cloud servers are treated as untrusted from user point of view as they are accessed through electronic super high way, the Internet. Cloud Computing is based on virtualization technology that facilitates to employ virtual machines for various operations of users thu...
متن کاملHost-Based Intrusion Detection and Attack Graph Selection in VNS
Cloud Computing has several major issues and concerns, such as expectations regulations, performance, trust, and data security issues. DDOS is a multiple hosts attacks made simultaneously in all network. DDoS attacks performed some vulnerable action in early stage such as low-frequency vulnerability scanning, multistep exploitation, and identifying the compromised vulnerable virtual machines as...
متن کاملDistributed Agent Based Model for Intrusion Detection System Based on Artificial Immune System
With mounting global network connectivity, the issue of intrusion has achieved importance, promoting active research on efficient Intrusion Detection Systems (IDS). Artificial Immune System (AIS) is a new bio-inspired model which is applied for solving various problems in the field of information security. Because of its unique features, (self-learning, self-adaptation and selfimprovement), AIS...
متن کاملA Novel Intrusion Detection Using Decentralized Attack Analyzer and Network Controller in Virtual Network System
Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such as multi step exploitation, low frequency vuln...
متن کاملNetwork Intrusion Detection in Virtual Network Systems and Countermeasure Selection (NIDCS)
Cloud computing provides shared resources to various cloud users. All the users share various computing resources e.g., being connected through the same switch, sharing the same data storage and the file systems. Hence the cloud security is the major concern in the cloud computing and has attracted lot of research activities. The most common issue with the cloud computing is the Distributed-Den...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 51 شماره
صفحات -
تاریخ انتشار 2007