期刊文献+

一种基于虚拟机的安全监测方法 被引量:6

A VIRTUAL MACHINE BASED SECURITY MONITORING SCHEME
下载PDF
导出
摘要 随着虚拟化广泛应用于如云计算等各种领域,渐渐成为各种恶意攻击的目标。虚拟机的运行时安全是重中之重。针对此问题,提出一种适用于虚拟化环境下的监测方法,并且在Xen中实现虚拟机的一个安全监测原型系统。通过这个系统,特权虚拟机可以对同一台物理机器上的大量客户虚拟机进行动态、可定制的监控。特别地,本系统对于潜伏在操作系统内核中的rootkit的检测十分有效。这种安全监测方法能有效提高客户虚拟机以及整个虚拟机系统的安全性。 As virtualization is widely applied to various fields such as cloud computing,it gradually becomes a target that various malicious attacks aim at.The runtime security of virtual machines is of the most importance.Aiming at this problem,a monitoring scheme suitable for virtualized environments is proposed.Moreover a security monitoring prototype system of a virtual machine is implemented in Xen.With this scheme,a privileged virtual machine can execute dynamic and customized monitoring upon the massive client virtual machines hosted in a same physical machine.Particularly,this system is very effective at detecting rootkits inside OS kernels.The security monitoring scheme can effectively increase the security not only of client virtual machines but also of the whole VM system.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第6期51-56,共6页 Computer Applications and Software
基金 国家重点基础研究发展计划(2007CB310905) 国家自然科学基金项目(90612018 60970008 90715030)
关键词 系统虚拟化 虚拟机 安全监测方法 ROOTKIT System virtualization Virtual machine Security monitoring scheme Rootkit
  • 相关文献

参考文献1

二级参考文献13

  • 1Goldberg R P. Architectural principles for virtual computer systems[D]. Harvard University, 1972.
  • 2Buzen J P, Gagliardi U O. The evolution of virtual machine arehiteeture[C]//Proceedings of the National Computer Conference and Exposition (AFIPS' 73), June 4-8, 1973. New York, NY, USA: ACM Press, 1973:291-299.
  • 3Attanasio C R. Virtual machines and data security[C]//Proeeedings of the Workshop on Virtual Computer Systems. New York, NY, USA: ACM Press, 1973:206-209.
  • 4Casarosa V, Paoil C. Vhm: A virtual hardware monitor[C]//Proceedings of the Workshop on Virtual Computer Systems. New York, NY, USA: ACM Press, 1973:150-169.
  • 5Goldberg R P. Architecture of virtual machines [C]//Proceedings of the National Computer Conference and Exposition (AFIPS'73), June 4-8, 1973. New York, NY, USA: ACM Press, 1973 : 309-318.
  • 6Smith J E, Nair R. The architecture of virtual machines [J]. Computer, 2005,38(5) : 32-38.
  • 7Rosenblum M, Garfinkel T. Virtual machine monitors: Current technology and future trends[J]. Computer, 2005,38 (5) : 39-47.
  • 8Rose R. Survey of system virtualization techniques[C]//Proc of the 3rd Int'l Conf on Parallel Processing and Applied Mathematics, 2004.
  • 9Arnold M, Fink S J, Grove D, et al. A survey of adaptive optimization in virtual machines[CJ//Proceedings of the IEEE, 2005,93 : 449-466.
  • 10Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization[C]//Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP' 03). New York, NY, USA: ACM Press, 2003:164-177.

共引文献4

同被引文献33

  • 1何欣,王晓凤.ARP协议及其安全隐患[J].河南大学学报(自然科学版),2004,34(2):90-92. 被引量:17
  • 2董耀祖,周正伟.基于X86架构的系统虚拟机技术与应用[J].计算机工程,2006,32(13):71-73. 被引量:63
  • 3Sadeghi A R, Schneider T, Winandy M. Token-Based cloud computing: Secure outsourcing of data and arbitrary computations with lower latency [A]. In:Proc. of the 3rd Int'l Conf. on Trust and Trustworthy Computing. Berlin: Springer-Verlag, 2010.417-429.
  • 4Wang Q,Wang C,Li J,Ren K,Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing[J].In:Backes M,Ning P,eds.LNCS 5789. Heidelberg:Springer-Verlag, 2009.355-370.
  • 5[日]竹下隆史,村山公保,荒井透,等.图解TCP/IP[M].北京:人民邮电出版社,2013.
  • 6Deepa Srinivasan,Zhi Wang,Xuxian Jiang,et al.Process out-grafting:an efficient“out-of-VM”approach for fine-grained process execution monitoring[C]//Proceedings of the 18th ACM conference on Computer and communications security(CCS’11),2011.
  • 7Zhi Wang,Xuxian Jiang,Weidong Cui,et al.Countering kernel rootkits with lightweight hook protection[C]//Proceedings of the 16th ACM conference on Computer and communications security(CCS’09),2009.
  • 8Monirul I Sharif,Wenke Lee,Weidong Cui,et al.Secure in-VM monitoring using hardware virtualization[C]//Proceedings of the 16th ACM conference on Computer and communications security(CCS’09),2009.
  • 9Xuxian Jiang,Xinyuan Wang,Dongyan Xu.Stealthy malware detection through vmm-based“out-of-the-box”semantic view reconstruction[C]//Proceedings of the 14th ACM conference on Computer and communications security(CCS’07),2007.
  • 10Junghwan Rhee,Riley R,Dongyan Xu,et al.Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring[C]//Proceedings of the 4th International Conference on Availability,Reliability and Security(ARES’09),2009.

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部