System Monitoring and Controlling Mechanism Based on Hypervisor

Q. Wu, C. Wang, Yusong Tan
{"title":"System Monitoring and Controlling Mechanism Based on Hypervisor","authors":"Q. Wu, C. Wang, Yusong Tan","doi":"10.1109/ISPA.2009.99","DOIUrl":null,"url":null,"abstract":"Current commodity operating systems allow a privileged user to run some programs in kernel mode by installing a kernel module or a device driver, but there isn’t an available method to verify the reliability of these programs. As a result, malware leverages this way to corrupt system services, defeat anti-malware and even get control of the whole system. It makes operating-system-based security tools undergo all kinds of hardships in face of various attacks. Virtualization technology brings a new chance to protect operating systems out-of-box in hypervisors. This article proposes a system monitoring and controlling framework, named as BMCS, which monitors low-level states and hardware accessing events of operating system in a hypervisor. BMCS abstracts low-level states and events and profiles OS-level semantics with the help of a hosted daemon. Moreover, it can control the execution of operating system software through the hypervisor. Our out-of box method can collect real run-time operating system profile and control the execution of the OS according some defined rules. As a result, it makes the operating system stronger. We implement BMCS based on KVM and experiment results prove that BMCS performs well.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPA.2009.99","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Current commodity operating systems allow a privileged user to run some programs in kernel mode by installing a kernel module or a device driver, but there isn’t an available method to verify the reliability of these programs. As a result, malware leverages this way to corrupt system services, defeat anti-malware and even get control of the whole system. It makes operating-system-based security tools undergo all kinds of hardships in face of various attacks. Virtualization technology brings a new chance to protect operating systems out-of-box in hypervisors. This article proposes a system monitoring and controlling framework, named as BMCS, which monitors low-level states and hardware accessing events of operating system in a hypervisor. BMCS abstracts low-level states and events and profiles OS-level semantics with the help of a hosted daemon. Moreover, it can control the execution of operating system software through the hypervisor. Our out-of box method can collect real run-time operating system profile and control the execution of the OS according some defined rules. As a result, it makes the operating system stronger. We implement BMCS based on KVM and experiment results prove that BMCS performs well.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于Hypervisor的系统监控机制
当前的商用操作系统允许特权用户通过安装内核模块或设备驱动程序在内核模式下运行某些程序,但是没有可用的方法来验证这些程序的可靠性。因此,恶意软件利用这种方式破坏系统服务,击败反恶意软件,甚至控制整个系统。这使得基于操作系统的安全工具在面对各种攻击时经历了各种困难。虚拟化技术为在管理程序中保护开箱即用的操作系统带来了新的机会。本文提出了一个系统监视和控制框架,称为BMCS,它监视管理程序中操作系统的低级状态和硬件访问事件。BMCS在托管守护进程的帮助下抽象低级状态和事件以及概要文件操作系统级语义。此外,它还可以通过hypervisor控制操作系统软件的执行。我们的开箱即用方法可以收集操作系统运行时的实时概况,并根据定义的规则控制操作系统的执行。因此,它使操作系统更强大。我们在KVM的基础上实现了BMCS,实验结果证明了BMCS的良好性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Completion Time Estimation for Instances of Generalized Well-Formed Workflow A Synchronization-Based Alternative to Directory Protocol Web Service Locating Unit in RFID-Centric Anti-counterfeit System Distributed Transfer Network Learning Based Intrusion Detection Multi-Source Traffic Data Fusion Method Based on Regulation and Reliability
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1