Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Intrusion detection in virtual machine environments
Laureano M., Maziero C., Jamhour E.  EUROMICRO (Proceedings of the 30th EUROMICRO Conference (EUROMICRO’04), Rennes, France,520-525.2004.Type:Proceedings
Date Reviewed: Sep 19 2005

Detecting intrusions in operating systems has been a subject of academic and industrial research for quite some time. Such intrusion detection systems fall into two broad categories: network-based and host-based. Host-based intrusion detection systems typically function by analyzing the system calls generated by “normal” processes. Such normal system call sequences are compared with those generated by the processes on a deployed system. Any deviations from the expected normal behavior can be then flagged as a possible intrusion.

One of the major problems with detecting intrusions in this manner is that the host-based intrusion detection agent software (from which such anomaly data is collected) can itself have been altered as a result of the intrusion. For example, the intruder could have manipulated the detection agent software to always report a normal sequence of system calls. Hence, such data cannot be entirely relied upon.

This paper presents an interesting approach, whereby platform virtualization technology is used to provide a fair degree of isolation between the detection agent and the system under possible intrusion. The essence of the approach lies in encapsulating the monitored system inside a “guest” virtual machine environment, and keeping the intrusion detection agent software isolated outside the virtual machine where the monitored system executes. The authors used a type two virtual machine monitor-based virtualization technology for this purpose (“type two” refers to a virtualization technology where the monitor executes as a normal process inside the host machine, which contains software to create more guest virtual machines).

One question remains unanswered: How do we ensure that the host machine is not running intruder software? Such an intrusion on the host-based monitor can have drastic consequences on its ability to report intrusion problems in the guest virtual machines.

Reviewer:  Suyash Sinha Review #: CR131794 (0611-1181)
Bookmark and Share
  Reviewer Selected
 
 
Invasive Software (K.6.5 ... )
 
 
Real-Time Systems And Embedded Systems (D.4.7 ... )
 
 
Symbolic Execution (D.2.5 ... )
 
 
Testing And Debugging (D.2.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Invasive Software": Date
Rogue programs: viruses, worms and Trojan horses
Hoffman L. (ed) Van Nostrand Reinhold Co., New York, NY,1990. Type: Divisible Book
Sep 1 1991
Computer viruses and anti-virus warfare
Hruska J., Ellis Horwood, Upper Saddle River, NJ, 1990. Type: Book (9780131710672)
Sep 1 1991
The computer virus handbook
Levin R., Osborne/McGraw-Hill, Berkeley, CA, 1990. Type: Book (9780078816475)
Sep 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy