DocumentCode :
2844622
Title :
On the design of Virtual machine Intrusion detection system
Author :
Tupakula, Udaya ; Varadharajan, Vijay
Author_Institution :
INSS Res. Group, Macquarie Univ., Sydney, NSW, Australia
fYear :
2011
fDate :
23-27 May 2011
Firstpage :
682
Lastpage :
685
Abstract :
In this paper we propose comprehensive security architecture called VICTOR to deal with different types of attacks on virtual machines. Our model takes into account the specific characteristics of operating system and applications running in each virtual machine (VM) at a fine granular level to deal with the attacks. Our architecture has several components such as entity validation, intrusion detection engine and dynamic analyzer. The entity validation component is used in the detection of attack traffic with spoofed source address, secure logging, and capturing information of the operating system and applications running in the virtual machines. The intrusion detection engine component is used for detection of known attacks and suspicious behaviour by monitoring the incoming and outgoing traffic of virtual machines. The dynamic analyzer is used for detection and validation of suspicious processes, detection of zero day attacks and fine granular isolation of malicious process or application that is generating the attack traffic.
Keywords :
security of data; virtual machines; VICTOR; dynamic analyzer; fine granular isolation; intrusion detection engine; secure logging; spoofed source address; suspicious behaviour; traffic; virtual machine; Australia; Hardware; IP networks; Irrigation; Levee; Trojan horses; Intrusion detection; Security architecture; Virtual machine monitorsy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on
Conference_Location :
Dublin
Print_ISBN :
978-1-4244-9219-0
Electronic_ISBN :
978-1-4244-9220-6
Type :
conf
DOI :
10.1109/INM.2011.5990655
Filename :
5990655
Link To Document :
بازگشت