DocumentCode :
1696037
Title :
Defend Against Denial of Service Attack with VMM
Author :
Zhao, Siqin ; Chen, Kang ; Zheng, Weimin
Author_Institution :
Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China
fYear :
2009
Firstpage :
91
Lastpage :
96
Abstract :
When a denial-of-service happens, the malicious programs often occupies too much computing resources. A defending schema proposed in this paper can use virtual machine monitor to detect such attack by adapting threshold of available resources. If the defending system assures existence of attack, it will live duplicates the operating system together with the tagged applications to reserved isolated environment. The isolated environment is another virtual machine that is similar to the original one. At the meantime, execution of the operating system and tagged application keeps continuously both in new environment and original one. Through this way, the defending system can protect the running of the operating system and tagged applications from denial-of-service attack.
Keywords :
operating systems (computers); security of data; virtual machines; denial-of-service attack; malicious program; operating system; virtual machine monitor; Application software; Computer crime; Detectors; Grid computing; Operating systems; Protection; Virtual machine monitors; Virtual machining; Virtual manufacturing; Web and internet services; DoS Attack; Isolated Environment; Selective Duplication; Threshold; Virtual Machine Monitor;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Grid and Cooperative Computing, 2009. GCC '09. Eighth International Conference on
Conference_Location :
Lanzhou, Gansu
Print_ISBN :
978-0-7695-3766-5
Type :
conf
DOI :
10.1109/GCC.2009.14
Filename :
5280109
Link To Document :
بازگشت