Design and Implementation of a Virtual Machine Introspection based Intrusion Detection System

نویسندگان

  • Thomas Kittel
  • Claudia Eckert
  • Christian Schneider
  • Jonas Pfoh
چکیده

I assure the single handed composition of this diploma thesis only supported by declared resources. Ich versichere, dass ich diese Diplomarbeit selbständig verfasst und nur die angegebe-nen Quellen und Hilfsmittel verwendet habe. Datum, Unterschrift 2 Intrusion Detection is a widespread topic in current security research. Common intrusion detection systems (IDSs) today are either host-based or network-based. Designers of both host-based and network-based IDSs have to trade a complete view over the monitored machine, the advantage of host-based IDSs, o against the system's tamper resistance, the advantage of network-based IDSs. The term virtual machine introspection (VMI) describes an approach of monitoring the state of a machine using virtualization techniques and analysing the state of the introspected machine from the hy-pervisor's point of view. VMI-based intrusion detection systems combine the advantages of both, host-based and network-based intrusion detection systems. This thesis describes the requirements, advantages and disadvantages of a VMI-based IDS. Further a proof-of-concept implementation of a VMI-based intrusion detection framework will be presented. The contribution of this thesis is a dynamic and modular framework, usable to detect malware. This framework integrates dierent VMI-based approaches discussed in this thesis. Furthermore, some example modules are implemented, used to accumulate, process and visualize the monitored machine's view. To verify the frameworks suitability for daily rootkit analysis, it will be shown that the framework and the proof-of-concept modules successfully detect real world rootkits using specialized detection modules. Finally, performance evaluation and further framework development will be discussed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

A Virtual Machine Introspection Based Architecture for Intrusion Detection

Today’s architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening in that host’s software, but is highly susceptible to attack. On the other hand, if the IDS resides in the network, it is more resistant to attack, but has a poor view of what is happening inside the host, making it more s...

متن کامل

Reflections on the Self-service Cloud Computing Project

Modern cloud computing infrastructures use virtual machine monitors (VMMs) that often include a large and complex administrative domain with privileges to inspect client VM state. Attacks against or misuse of the administrative domain can compromise client security and privacy. Moreover, these VMMs provide clients inflexible control over their own VMs, as a result of which clients have to rely ...

متن کامل

Iterative Backtracking via Deterministic Virtual Machine Replay and Virtual Machine Introspection

We propose a security analysis system that enables tracking and understanding system intrusions fully and precisely, using deterministic virtual machine replay and virtual machine introspection. Understanding the behaviors of system intrusions is important for malware defense systems to discover their vulnerabilities and prevent them to be exploited for the future. Existing approaches fail to e...

متن کامل

Virtual Machine Security Systems

Current operating systems provide the process abstraction to achieve resource sharing and isolation. From a security perspective, however, an attacker who has compromised one process can usually gain control of the entire machine. This makes security systems running on the same computer, such as anti-virus programs or intrusion detection systems, also vulnerable to attack. In response to the im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010