Design and Implementation of a Virtual Machine Introspection based Intrusion Detection System
نویسندگان
چکیده
I assure the single handed composition of this diploma thesis only supported by declared resources. Ich versichere, dass ich diese Diplomarbeit selbständig verfasst und nur die angegebe-nen Quellen und Hilfsmittel verwendet habe. Datum, Unterschrift 2 Intrusion Detection is a widespread topic in current security research. Common intrusion detection systems (IDSs) today are either host-based or network-based. Designers of both host-based and network-based IDSs have to trade a complete view over the monitored machine, the advantage of host-based IDSs, o against the system's tamper resistance, the advantage of network-based IDSs. The term virtual machine introspection (VMI) describes an approach of monitoring the state of a machine using virtualization techniques and analysing the state of the introspected machine from the hy-pervisor's point of view. VMI-based intrusion detection systems combine the advantages of both, host-based and network-based intrusion detection systems. This thesis describes the requirements, advantages and disadvantages of a VMI-based IDS. Further a proof-of-concept implementation of a VMI-based intrusion detection framework will be presented. The contribution of this thesis is a dynamic and modular framework, usable to detect malware. This framework integrates dierent VMI-based approaches discussed in this thesis. Furthermore, some example modules are implemented, used to accumulate, process and visualize the monitored machine's view. To verify the frameworks suitability for daily rootkit analysis, it will be shown that the framework and the proof-of-concept modules successfully detect real world rootkits using specialized detection modules. Finally, performance evaluation and further framework development will be discussed.
منابع مشابه
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملA Virtual Machine Introspection Based Architecture for Intrusion Detection
Today’s architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening in that host’s software, but is highly susceptible to attack. On the other hand, if the IDS resides in the network, it is more resistant to attack, but has a poor view of what is happening inside the host, making it more s...
متن کاملReflections on the Self-service Cloud Computing Project
Modern cloud computing infrastructures use virtual machine monitors (VMMs) that often include a large and complex administrative domain with privileges to inspect client VM state. Attacks against or misuse of the administrative domain can compromise client security and privacy. Moreover, these VMMs provide clients inflexible control over their own VMs, as a result of which clients have to rely ...
متن کاملIterative Backtracking via Deterministic Virtual Machine Replay and Virtual Machine Introspection
We propose a security analysis system that enables tracking and understanding system intrusions fully and precisely, using deterministic virtual machine replay and virtual machine introspection. Understanding the behaviors of system intrusions is important for malware defense systems to discover their vulnerabilities and prevent them to be exploited for the future. Existing approaches fail to e...
متن کاملVirtual Machine Security Systems
Current operating systems provide the process abstraction to achieve resource sharing and isolation. From a security perspective, however, an attacker who has compromised one process can usually gain control of the entire machine. This makes security systems running on the same computer, such as anti-virus programs or intrusion detection systems, also vulnerable to attack. In response to the im...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010