Virtual Machine Introspection for Anomaly-Based Keylogger Detection

Huseyn Huseynov, Kenichi Kourai, T. Saadawi, O. Igbe
{"title":"Virtual Machine Introspection for Anomaly-Based Keylogger Detection","authors":"Huseyn Huseynov, Kenichi Kourai, T. Saadawi, O. Igbe","doi":"10.1109/HPSR48589.2020.9098980","DOIUrl":null,"url":null,"abstract":"Software Keyloggers are dominant class of malicious applications that surreptitiously logs all the user activity to gather confidential information. Among many other types of keyloggers, API-based keyloggers can pretend as unprivileged program running in a user-space to eavesdrop and record all the keystrokes typed by the user. In a Linux environment, defending against these types of malware means defending the kernel against being compromised and it is still an open and difficult problem. Considering how recent trend of edge computing extends cloud computing and the Internet of Things (IoT) to the edge of the network, a new types of intrusion-detection system (IDS) has been used to mitigate cybersecurity threats in edge computing. Proposed work aims to provide secure environment by constantly checking virtual machines for the presence of keyloggers using cutting edge artificial immune system (AIS) based technology. The algorithms that exist in the field of AIS exploit the immune system’s characteristics of learning and memory to solve diverse problems. We further present our approach by employing an architecture where host OS and a virtual machine (VM) layer actively collaborate to guarantee kernel integrity. This collaborative approach allows us to introspect VM by tracking events (interrupts, system calls, memory writes, network activities, etc.) and to detect anomalies by employing negative selection algorithm (NSA).","PeriodicalId":163393,"journal":{"name":"2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HPSR48589.2020.9098980","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

Software Keyloggers are dominant class of malicious applications that surreptitiously logs all the user activity to gather confidential information. Among many other types of keyloggers, API-based keyloggers can pretend as unprivileged program running in a user-space to eavesdrop and record all the keystrokes typed by the user. In a Linux environment, defending against these types of malware means defending the kernel against being compromised and it is still an open and difficult problem. Considering how recent trend of edge computing extends cloud computing and the Internet of Things (IoT) to the edge of the network, a new types of intrusion-detection system (IDS) has been used to mitigate cybersecurity threats in edge computing. Proposed work aims to provide secure environment by constantly checking virtual machines for the presence of keyloggers using cutting edge artificial immune system (AIS) based technology. The algorithms that exist in the field of AIS exploit the immune system’s characteristics of learning and memory to solve diverse problems. We further present our approach by employing an architecture where host OS and a virtual machine (VM) layer actively collaborate to guarantee kernel integrity. This collaborative approach allows us to introspect VM by tracking events (interrupts, system calls, memory writes, network activities, etc.) and to detect anomalies by employing negative selection algorithm (NSA).
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于异常的键盘记录器检测的虚拟机自省
软件键盘记录器是恶意应用程序的主要类别,它秘密地记录所有用户活动以收集机密信息。在许多其他类型的键盘记录程序中,基于api的键盘记录程序可以假装成在用户空间中运行的非特权程序来窃听和记录用户键入的所有按键。在Linux环境中,防御这些类型的恶意软件意味着保护内核不被破坏,这仍然是一个开放和困难的问题。考虑到最近边缘计算的趋势如何将云计算和物联网(IoT)扩展到网络的边缘,一种新型的入侵检测系统(IDS)被用于缓解边缘计算中的网络安全威胁。提议的工作旨在通过使用尖端的基于人工免疫系统(AIS)的技术不断检查虚拟机是否存在键盘记录器来提供安全的环境。AIS领域中存在的算法利用免疫系统的学习和记忆特性来解决各种问题。我们进一步介绍了我们的方法,采用一种架构,其中主机操作系统和虚拟机(VM)层主动协作以保证内核完整性。这种协作方法允许我们通过跟踪事件(中断、系统调用、内存写、网络活动等)来内省VM,并通过使用负选择算法(NSA)来检测异常。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Impact of Large-Scale Correlated Failures on Multilevel Virtualized Networks HPSR 2020 Table of Contents SERENADE: A Parallel Iterative Algorithm for Crossbar Scheduling in Input-Queued Switches Qualitative Communication Via Network Coding and New IP : Invited Paper i-CEON: Information-centric Elastic Optical Transport Network for Efficient Content Delivery
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1