DocumentCode
2979458
Title
Increasing attacker workload with virtual machines
Author
Kuhn, Stephen ; Taylor, Stephen
Author_Institution
Thayer Sch. of Eng., Dartmouth Coll., Hanover, NH, USA
fYear
2011
fDate
7-10 Nov. 2011
Firstpage
2176
Lastpage
2181
Abstract
Much of the traffic in modern computer networks is conducted between clients and servers, rather than client-to-client. As a result, servers represent a high-value target for collection and analysis of network traffic. The observe, orient, decide, and act (OODA) loop for network attack involves surveillance, to determine if a vulnerability is present, selection of an appropriate exploit, use of the exploit to gain access, and persistence for a time sufficient enough to carry out some effect. The time spent in surveillance and persistence may range from seconds to months depending upon the intent of the attack. This paper describes a novel hypervisor technology that increases attacker workload by denying the ability to carry out surveillance. It also denies persistence, even if the attack is successful and never detected.
Keywords
computer network security; telecommunication traffic; virtual machines; attacker workload; clients; hypervisor technology; modern computer networks; network attack; network traffic; observe orient decide and act loop; servers; virtual machines; Bridges; IP networks; Surveillance; Virtual machine monitors; Virtual machining; Web servers; deny persistence; security; virtualiztion; web services;
fLanguage
English
Publisher
ieee
Conference_Titel
MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011
Conference_Location
Baltimore, MD
ISSN
2155-7578
Print_ISBN
978-1-4673-0079-7
Type
conf
DOI
10.1109/MILCOM.2011.6127643
Filename
6127643
Link To Document