Title :
On the design of Virtual machine Intrusion detection system
Author :
Tupakula, Udaya ; Varadharajan, Vijay
Author_Institution :
INSS Res. Group, Macquarie Univ., Sydney, NSW, Australia
Abstract :
In this paper we propose comprehensive security architecture called VICTOR to deal with different types of attacks on virtual machines. Our model takes into account the specific characteristics of operating system and applications running in each virtual machine (VM) at a fine granular level to deal with the attacks. Our architecture has several components such as entity validation, intrusion detection engine and dynamic analyzer. The entity validation component is used in the detection of attack traffic with spoofed source address, secure logging, and capturing information of the operating system and applications running in the virtual machines. The intrusion detection engine component is used for detection of known attacks and suspicious behaviour by monitoring the incoming and outgoing traffic of virtual machines. The dynamic analyzer is used for detection and validation of suspicious processes, detection of zero day attacks and fine granular isolation of malicious process or application that is generating the attack traffic.
Keywords :
security of data; virtual machines; VICTOR; dynamic analyzer; fine granular isolation; intrusion detection engine; secure logging; spoofed source address; suspicious behaviour; traffic; virtual machine; Australia; Hardware; IP networks; Irrigation; Levee; Trojan horses; Intrusion detection; Security architecture; Virtual machine monitorsy;
Conference_Titel :
Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on
Conference_Location :
Dublin
Print_ISBN :
978-1-4244-9219-0
Electronic_ISBN :
978-1-4244-9220-6
DOI :
10.1109/INM.2011.5990655