学位论文详细信息
An architecture for trustworthy services built on event based probing of untrusted guests
Intrusion Detection;Hypervisor;Trustworthy Logging
Sprabery, Read T ; Campbell ; Roy ; Bobba ; Rakesh
关键词: Intrusion Detection;    Hypervisor;    Trustworthy Logging;   
Others  :  https://www.ideals.illinois.edu/bitstream/handle/2142/92849/SPRABERY-THESIS-2016.pdf?sequence=1&isAllowed=y
美国|英语
来源: The Illinois Digital Environment for Access to Learning and Scholarship
PDF
【 摘 要 】

Numerous event-based probing methods exist for cloud computing environments allowing a trusted hypervisor to gain insight into guest activities. Such event based probing has been shown to be useful for detecting attacks, system hangs through watchdogs, and also for inserting exploit detectors before a system can be patched, among others. In this paper, we illustrate how to use such probing for trustworthy logging and highlight some of the challenges that existing event based probing mechanisms do not address. These challenges include ensuring a probe inserted at given address is trustworthy despite the lack of attestation available for probes that have been inserted dynamically. We show how probes can be inserted to ensure proper logging of every invocation of a probed instruction. When combined with attested boot of the hypervisor and guest machines, we can ensure the output stream of monitored events is trustworthy. Using these techniques we build a trustworthy log of certain guest-system-call events powering a cloud-tuned Intrusion Detection System (IDS). Additionally, we identify new types of events that must be added to existing probing systems to ensure attempts to circumvent probes within the guest appear in the log. We highlight the overhead penalties paid by guests to ensure log completeness when faced with probabilistic attacks and show promising results (less that 10% for guests) when a guest is willing to relax the trade-off between log completeness and overhead. Our demonstrative IDS shows the ability to detect common attack scenarios with simple policies built using our guest behavior recording system.

【 预 览 】
附件列表
Files Size Format View
An architecture for trustworthy services built on event based probing of untrusted guests 753KB PDF download
  文献评价指标  
  下载次数:8次 浏览次数:23次