Endpoint Configuration Compliance Monitoring via Virtual Machine Introspection

被引:0
|
作者
Kienzle, Darrell
Persaud, Ryan
Elder, Matthew
机构
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We describe a system for externally monitoring endpoint configuration compliance of an end user system that provides a high assurance monitoring function and data. Typical approaches to monitoring for endpoint configuration compliance rely on the integrity of the endpoint's operating system and do not protect the monitoring function from subversion or spoofing by threats from within the monitored system. Our approach utilizes (1) a virtual machine architecture on the endpoint system to protect the monitoring function and (2) virtual machine introspection of the end user's environment. In this paper we describe our approach to external monitoring of endpoint configuration compliance, present the technical details of our monitoring system, provide a description of sonic experimentation and observations, and discuss some of the issues associated with external monitoring
引用
收藏
页码:926 / 935
页数:10
相关论文
共 50 条
  • [1] Virtual Machine Introspection based Cloud Monitoring Platform
    Lauren, Samuel
    Leppanen, Ville
    COMPUTER SYSTEMS AND TECHNOLOGIES (COMPSYSTECH'18), 2018, 1641 : 104 - 109
  • [2] VMI-PL: A monitoring language for virtual platforms using virtual machine introspection
    Westphal, Florian
    Axelsson, Stefan
    Neuhaus, Christian
    Polze, Andreas
    DIGITAL INVESTIGATION, 2014, 11 : S85 - S94
  • [3] Virtual Machine Introspection: Techniques and Applications
    Hebbal, Yacine
    Laniepce, Sylvie
    Menaud, Jean-Marc
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 676 - 685
  • [4] A lightweight method for virtual machine introspection
    N. I. Fursova
    P. M. Dovgalyuk
    I. A. Vasil’ev
    V. A. Makarov
    Programming and Computer Software, 2017, 43 : 307 - 313
  • [5] Virtual machine introspection - Observation or interference?
    Nance, Kara
    Hay, Brian
    Bishop, Matt
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 32 - 37
  • [6] A Low-overhead Kernel Object Monitoring Approach for Virtual Machine Introspection
    Zhan, Dongyang
    Li, Huhua
    Ye, Lin
    Zhang, Hongli
    Fang, Binxing
    Du, Xiaojiang
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [7] A lightweight method for virtual machine introspection
    Fursova, N. I.
    Dovgalyuk, P. M.
    Vasil'ev, I. A.
    Makarov, V. A.
    PROGRAMMING AND COMPUTER SOFTWARE, 2017, 43 (05) : 307 - 313
  • [8] Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection
    Ahmed, Irfan
    Richard, Golden G., III
    Zoranic, Aleksandar
    Roussev, Vassil
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 3 - 19
  • [9] A Universal Semantic Bridge for Virtual Machine Introspection
    Schneider, Christian
    Pfoh, Jonas
    Eckert, Claudia
    INFORMATION SYSTEMS SECURITY, 2011, 7093 : 370 - 373
  • [10] CryptVMI: Encrypted Virtual Machine Introspection in the Cloud
    Yao, Fangzhou
    Campbell, Roy H.
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 977 - 978