Title :
Defend Against Denial of Service Attack with VMM
Author :
Zhao, Siqin ; Chen, Kang ; Zheng, Weimin
Author_Institution :
Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China
Abstract :
When a denial-of-service happens, the malicious programs often occupies too much computing resources. A defending schema proposed in this paper can use virtual machine monitor to detect such attack by adapting threshold of available resources. If the defending system assures existence of attack, it will live duplicates the operating system together with the tagged applications to reserved isolated environment. The isolated environment is another virtual machine that is similar to the original one. At the meantime, execution of the operating system and tagged application keeps continuously both in new environment and original one. Through this way, the defending system can protect the running of the operating system and tagged applications from denial-of-service attack.
Keywords :
operating systems (computers); security of data; virtual machines; denial-of-service attack; malicious program; operating system; virtual machine monitor; Application software; Computer crime; Detectors; Grid computing; Operating systems; Protection; Virtual machine monitors; Virtual machining; Virtual manufacturing; Web and internet services; DoS Attack; Isolated Environment; Selective Duplication; Threshold; Virtual Machine Monitor;
Conference_Titel :
Grid and Cooperative Computing, 2009. GCC '09. Eighth International Conference on
Conference_Location :
Lanzhou, Gansu
Print_ISBN :
978-0-7695-3766-5
DOI :
10.1109/GCC.2009.14