期刊文献+

Prototype for logging system calls and its overhead analysis

Prototype for logging system calls and its overhead analysis
下载PDF
导出
摘要 With the capability of the virtual machine monitor, a novel approach for logging system activities is designed. In the design, the guest operating system runs on the virtual machine monitor as non-privileged mode. The redirecting and monitoring modules are added into the virtual machine monitor. When a guest application is calling a system call, it is trapped and redirected from the least privileged level into the virtual machine monitor running in the most privileged level. After logging is finished. it returns to the guest operating system running in the more privileged level and starts the system call. Compared with the traditional methods for logging system activities, the novel method makes it more difficult to destroy or tamper the logs. The preliminary evaluation shows that the prototype is simple and efficient. With the capability of the virtual machine monitor, a novel approach for logging system activities is designed. In the design, the guest operating system runs on the virtual machine monitor as non-privileged mode. The redirecting and monitoring modules are added into the virtual machine monitor. When a guest application is calling a system call, it is trapped and redirected from the least privileged level into the virtual machine monitor running in the most privileged level. After logging is finished. it returns to the guest operating system running in the more privileged level and starts the system call. Compared with the traditional methods for logging system activities, the novel method makes it more difficult to destroy or tamper the logs. The preliminary evaluation shows that the prototype is simple and efficient.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第3期661-666,F0003,共7页 系统工程与电子技术(英文版)
关键词 virtual machine monitor virtual monitor XEN guest operating system hyper call system call. virtual machine monitor, virtual monitor, Xen, guest operating system, hyper call, system call.
  • 相关文献

参考文献20

  • 1Samuel T.King,Peter M.Chen,Backtracking intrusions.ACM Transactions on Computer Systems (TOCS) archive,2005,23(1).
  • 2Steven Hofmeyr A,Stephanie Forrest,Anil Somayaji.Intrusion detection using sequences of system calls.Journal of Computer Security,1998,6:151-180.
  • 3The Honeynet Project“Know Your Enemy:Sebek” http://project.honeynet.org/papers/sebek.pdf,May 2003.
  • 4Yihua Liao,Rao Vemuri V.Using Text Categorization techniques for intrusion detection.Proceedings of the 11th Usenix Security Symposium,SanFrancisco,2002,8:5-9.
  • 5Alexandra Fedorova Omri Traub.Logging Options in a Virtual Honeynet.http://www.eecs.harvard.edu/fedorova/presentations/logging-honeynet.ppt,May 2003.
  • 6Peter Chen M,Brian Noble D.when virtual is better than real.Proceedings of the 2001 Workshop on Hot Topics in Operating Systems (HotOS),May 2001.
  • 7Robert Goldberg P.Survey of virtual machine research.IEEE Computer,1974,7(6).
  • 8Barham P,Dragovic B,Fraser K,Hand S,Harris T,Ho A,Neugebauer R,Pratt I,and Warfield A.Xen and the art of virtualization.In Proceedings of the 19th ACM Symposium on Operating Systems Principles,October 2003,10:164-177.
  • 9The Xen project.http://www,cl.cam.ac.uk/Research/SRG/netos/xen/,Sep 2003.
  • 10Jiang Xuxian,Xu Dongyan,Rudolf Eigenmann.Protection mechanisms for application service hosting platforms.Proceedings of IEEE/ACM Int'l Symposiumon Cluster Computing and the Grid (CCGrid 2004),Chicago,IL,April 2004.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部