首页> 外文学位 >Virtual machine based mechanisms and tools for cyber attack prevention, analysis, and recovery.
【24h】

Virtual machine based mechanisms and tools for cyber attack prevention, analysis, and recovery.

机译:基于虚拟机的机制和工具,用于网络攻击的预防,分析和恢复。

获取原文
获取原文并翻译 | 示例

摘要

Throughout the last decade we have witnessed a widespread use of the Internet and a dramatic change in the way people communicate, do business, and present themselves to the world. It did not take long before criminals started exploring this rich environment seeking fun, pride and later illicit money and even war. In the light of this new generation of malware and attacker's motivations, complete defense strategies must address prevention, detection and response to attacks. In spite of that, the majority of efforts in malware defense currently focus on detection.;This dissertation addresses prevention and post attack analysis and recovery in the context of virtual machine (VM) environments. It provides a study of full system replay for post-attacks analysis where the execution of an entire system from a checkpoint can be faithfully replayed with low performance/space overhead. Building on this research, it describes the application of this replay approach on post-attack recovery from control-flow hijacking Internet worms. Finally, this dissertation challenges the traditional VM usage model that advocates placing security mechanisms only in the VM layer, letting the guest operating system (OS) run unaware of virtualization. It shows how collaboration between the guest OS and a VM helps bridge the semantic gap between these layers and provides stronger system protection. The dissertation additionally reports on implementations and proot-of-concept prototypes of these mechanisms, showing them to be effective for their respective scope. The implementations and prototypes validate our proposed approaches and have no false positives or negatives (in the context of prevention and for all the attacks used in our experiments), low performance/space overhead (post-attack analysis) and address zero-day attacks (post attack recovery).
机译:在过去的十年中,我们目睹了Internet的广泛使用以及人们与人交流,开展业务和向世界展示自己的方式的巨大变化。不久之后,犯罪分子便开始探索这种丰富的环境,以寻求乐趣,自豪感以及后来的非法金钱甚至战争。鉴于新一代恶意软件和攻击者的动机,完整的防御策略必须解决预防,检测和对攻击的响应。尽管如此,当前在恶意软件防御方面的大部分工作都集中在检测上。本论文着眼于虚拟机(VM)环境中的预防以及攻击后的分析和恢复。它提供了针对攻击后分析的完整系统重播的研究,其中可以以低性能/空间开销忠实地重播从检查点执行的整个系统。在此研究的基础上,它描述了此重放方法在控制流劫持Internet蠕虫的攻击后恢复中的应用。最后,本文对传统的VM使用模型提出了挑战,该模型提倡仅在VM层中放置安全性机制,从而使来宾操作系统(OS)在未虚拟化的情况下运行。它显示了来宾OS和VM之间的协作如何帮助弥合这些层之间的语义鸿沟并提供更强大的系统保护。论文还报告了这些机制的实现和概念验证原型,表明它们在各自的范围内是有效的。这些实现和原型验证了我们提出的方法,并且没有错误的肯定或否定(在预防的背景下以及对于我们实验中使用的所有攻击),低的性能/空间开销(攻击后分析)并解决了零日攻击(攻击后恢复)。

著录项

  • 作者单位

    University of California, Davis.;

  • 授予单位 University of California, Davis.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2010
  • 页码 101 p.
  • 总页数 101
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号