Deploying Virtual Honeypots on Virtual Machine Monitor

被引:0
|
作者
Zakaria, Wira Zanoramy Ansiry [1 ]
Ahmad, Siti Rohaidah [1 ]
Azz, Norazah Abd [1 ]
机构
[1] MIMOS Berhad, Cyberspace Secur Ctr, Kuala Lumpur 57000, Malaysia
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Xen is a virtual machine monitor that supports execution of multiple guest operating systems on the same computer hardware at the some time with unprecedented levels of performance and resource isolation. Honeypot is a decoy system, deployed throughout the network, which purposely built to attract and deceive computer intruders and malicious programs. In this paper, we review the combination of both, virtualization technologies of Xen and honeypot concept, in order to deploy and run virtual honeypot on top of virtual machine monitor.
引用
收藏
页码:2686 / 2690
页数:5
相关论文
共 50 条
  • [1] Implementation of Virtual Time System for the Distributed Virtual Machine Monitor
    Chen, Siming
    Zhu, Mingfa
    Xiao, Limin
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 571 - 576
  • [2] On recognizing virtual honeypots and countermeasures
    Fu, Xinwen
    Yu, Wei
    Cheng, Dan
    Tan, Xuejun
    Streff, Kevin
    Graham, Steve
    [J]. DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 211 - 218
  • [3] Is Your Virtual Machine Monitor Secure?
    Karger, Paul A.
    [J]. APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 5 - 5
  • [4] Research on Mechanism of Deploying Virtual Machine in the Mode of IaaS
    He, Jian-min
    Cao, Wei-jie
    Min, Rui
    [J]. 2013 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT SCIENCE (ICIEMS 2013), 2013, : 1187 - 1193
  • [5] Load Balancing in Xen Virtual Machine Monitor
    Somani, Gaurav
    Chaudhary, Sanjay
    [J]. CONTEMPORARY COMPUTING, PT 2, 2010, 95 : 62 - +
  • [6] SIVARM: a Virtual Machine Monitor for the ARM Architecture
    Suzuki, Akihiro
    Oikawa, Shuichi
    [J]. TENCON 2010: 2010 IEEE REGION 10 CONFERENCE, 2010, : 1088 - 1093
  • [7] Design of Virtual Machine Monitor for Embedded Systems
    Son, Sung Hoon
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 1629 - 1632
  • [8] Performance Evaluation for Deploying Docker Containers On Baremetal and Virtual Machine
    Lingayat, Ashish
    Badre, Ranjana R.
    Gupta, Anil Kumar
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 1019 - 1023
  • [9] Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection
    Sentanoe, Stewart
    Taubmann, Benjamin
    Reiser, Hans P.
    [J]. SECURE IT SYSTEMS, 2018, 11252 : 255 - 271
  • [10] Automated dynamic redistribution of virtual operating systems under the xen virtual machine monitor
    Vachon, Travis F.
    Teresco, James D.
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2007, : 190 - +