【24h】

KVM-based Detection of Rootkit Attacks

机译:基于KVM的Rootkit攻击检测

获取原文
获取原文并翻译 | 示例

摘要

The kernel-level Root kit brings operating system mortal security risk. The existing detection methods, which are based on host environment, have limitations such as high Root kit privileges, weak isolation capacity. If the detected system, which may includes Root kit, and the detection system are resided on guest and host environment respectively, those limitations can be resolved. The paper proposed a method of Root kit detection based on KVM (Kernel-based Virtual Machine) by using virtualization technology. This method adopts guest memory protection mechanism, which is based on protection of host page tables and trusted code segments, for static kernel code and data. As for dynamically allocated code and data in heap space, this method introduces integrity checking mechanism, which is based on threshold triggering of calling sequences of monitored functions. The experimental results showed that this method can prevent static code or data from Root kit attacking effectively, and also detect attacks to dynamically allocated code or data quickly.
机译:内核级Root套件带来了操作系统致命的安全风险。现有的基于主机环境的检测方法具有局限性,如Root Kit特权高,隔离能力弱。如果检测到的系统(可能包括Root kit)和检测系统分别位于来宾和主机环境中,则可以解决这些限制。提出了一种利用虚拟化技术的基于KVM(基于内核的虚拟机)的Root工具包检测方法。该方法采用来宾内存保护机制,该机制基于对主机页表和受信任代码段的保护,以保护静态内核代码和数据。对于堆空间中动态分配的代码和数据,此方法引入了完整性检查机制,该机制基于阈值触发被监视函数的调用序列。实验结果表明,该方法可以有效地防止Root工具包中的静态代码或数据受到攻击,并且可以快速检测出对动态分配的代码或数据的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号