【24h】

Assessment of Virtualization as a Sensor Technique

机译:虚拟化作为一种​​传感器技术的评估

获取原文
获取原文并翻译 | 示例

摘要

The explosive growth of malware development and the increasing sophistication of malware behavior require thatsecurity researchers be on the lookout for new vectors of attacks. Drive-by-downloads are among the types of attacks that are onthe rise. To study them, researchers use client honeypots deployed in virtualized environments; however, virtualization isdetectable. There is evidence of malware detecting virtualization and hiding its malicious intent to avoid detection and furtherstudy. This research aims to identify differences in detection capabilities of honeypots deployed in two different environments,those deployed in virtual machines and those deployed in physical machines. With this objective, these researchers developed abare-metal honeypot that does not use virtualization. The honeypots deployed in both environments accessed malicious URLs andclassified them. Discrepancies in the resulting classification were analyzed. Accomplishments include the identification of anexperimental methodology to be scaled for a larger study during the next phase of this research.Keywords- honeypot; virtual machine; cyber-security; malware; malware analysis; virtualization; virtualization
机译:恶意软件开发的爆炸性增长和恶意软件行为的日益复杂要求安全研究人员寻找新的攻击媒介。驱动下载是不断增加的攻击类型。为了研究它们,研究人员使用了部署在虚拟环境中的客户端蜜罐。但是,虚拟化是可以检测到的。有证据表明恶意软件会检测虚拟化并隐藏其恶意意图以避免检测和进一步研究。本研究旨在确定在两种不同环境中部署的蜜罐(在虚拟机中部署的物理罐和在物理机中部署的蜜罐)的检测能力的差异。出于这一目标,这些研究人员开发了不使用虚拟化的金属制蜜罐。在两种环境中部署的蜜罐都访问了恶意URL并对其进行了分类。分析了所得分类中的差异。成就包括在下一阶段的研究中确定将用于大规模研究的实验方法。虚拟机;网络安全;恶意软件;恶意软件分析;虚拟化;虚拟化

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号