期刊文献+

基于VMM的Rootkit检测技术及模型分析 被引量:3

The Analysis of VMM based Rootkit Detecting Technology and Model
下载PDF
导出
摘要 随着计算机网络的发展,信息安全已逐渐成为当今社会的主要问题之一。内核态Rootkit以其良好的隐蔽特性被广泛应用于恶意代码中,严重影响操作系统内核的完整性。文章首先对基于LKM的Linux主流Rootkit技术进行了归纳整理,剖析了当前基于VMM的Rootkit检测技术及模型的原理和架构,对"In-VM"、"In-VMM"和"In-Host"检测模型的有效性、实用性、可靠性等方面进行了讨论和对比分析,其中"In-VM"模型在Rootkit检测在有效性方面效果突出,而"In-Host"模型在实用性和可靠性方面效果较好,"In-VMM"作为二者的折中方案,其各方面特性相对均衡。基于VMM的Rootkit检测技术及模型的分析,为明确该领域的研究方向及进一步研究提供参考依据。 With the development of computer networks, information security has gradually become one of the main problems of today's society. Because of the hiding characteristics, the kernel level Rootkit are widely used in malicious code, seriously affect the integrity of the operating system kernel. This paper, firstly generalized the LKM based Linux mainstream Rootkit. Secondly, it analyzed the framework and theory of the VMM based Rootkit detection technology and model, discussed and compared the effectiveness, practicality and reliability of the "In-VM", "In- VMM" and "In-Host" detection model. "In-VM" Rootkit detection model has great effectiveness, "In-Host" detection model is proved to has better practicality and reliability, "In-VMM" as the compromise solution of the former, it has a relatively balanced characteristics of the various aspects. The analysis of the VMM based Rootkit detection technology and model, can help to clarify the direction of research in this field, and provide a reference for further research.
作者 冯帆 罗森林
出处 《信息网络安全》 2013年第6期35-39,89,共6页 Netinfo Security
关键词 ROOTKIT 虚拟机监控器 检测模型 语义重构 交叉视图 rootkit virtual machine monitor detecting model semantic reconstruction cross view
  • 相关文献

参考文献14

  • 1Joanna Rutkowska. Subverting VistaTM Kernel For Fun And Profitc. Black Hat Presentation, Las Vegas August 3rd,2006.
  • 2Xuxian J, Xinyuan W, Dongyan X. Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction[J]. ACM Transactions on Information and Systems Security, 2010, 13(02): 12-28.
  • 3袁源,戴冠中.LKM后门综述[J].计算机科学,2008,35(7):5-8. 被引量:12
  • 4DanielP.Bovet,MarcoCesati.深入理解Linux内核(第三版)[M].北京:中国电力出版社,2006.
  • 5Lin C, Bo L, Huaping H, et al. Researches on detecting malware based on virtual machine[C]. Piscataway, NJ, USA: IEEE, 2011.
  • 6Payne B D, Co, bone M D P D, Lee W. Secure and flexible monitoring of virtual machines[C]. Miami Beach, FL, United states: IEEE Computer Society, 2007.
  • 7王丽娜,高汉军,刘炜,彭洋.利用虚拟机监视器检测及管理隐藏进程[J].计算机研究与发展,2011,48(8):1534-1541. 被引量:26
  • 8Xuxicm J, Xinyuan W, Dongyan X. Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction[J]. ACM Transactions on Information and Systems Security. 2010, 13(02): 12-28.
  • 9Jones S.T, Arpaci-Dusseau A C, Arpaci-Dusseau R H. Antfarm: trackin9 processes in a virtual machine environment[C]. Berkeley, CA, USA: USENIX Association, 2006.
  • 10李博,李建欣,胡春明,沃天宇,怀进鹏.基于VMM层系统调用分析的软件完整性验证[J].计算机研究与发展,2011,48(8):1438-1446. 被引量:13

二级参考文献54

共引文献45

同被引文献38

  • 1王怀习,陈建熊,王晨,刘克胜.云计算中虚拟化技术的安全威胁[J].华中科技大学学报(自然科学版),2012,40(S1):153-156. 被引量:10
  • 2王磊.网络犯罪若干问题研究[D].北京:中共中央党校,2011.
  • 3HOGLUND G, BUTLER J. Rootkits: subverting the Windows kernel [M]. [S. 1. ] :Addison-Wesley Professional,2005.
  • 4CHEN P M, NOBLE B D. When virtual is better than real[ C ]//Proc of the 8th Workshop on Hot Topics in Operating Systems. Washington DC :IEEE Computer Society,2001 : 133-138.
  • 5BARHAM P, DRAGOVIC B, FRASER K, et al. Xen and the art of virtualization[C]//Proc of the 19th ACM Symposium on Operating Systems Principles. New York : ACM Press ,2003 : 164-177. 2012,23(8) :2173-2188.
  • 6WHITE J S, PAPE S R, MEILY A T, et al. Dynamic malware analy- sis using IntroVirt : a modified hypervisor-based system [ C ]//Proc of SPIE Defense Security and Sensing Cyber Security Conference. 2013.
  • 7JONES S, ARPACI-DUSSEAU A, ARPACI-DUSSEAU R. AntFarm: tracking processes in a virtual machine environment[ C]//Proc of An- nual USENIX Technical Conference. Berkeley, CA : USENIX, 2008 : 1 - 14.
  • 8PAYNE B D, CARBONE M, LEE W. Secure and flexible monit.oring of virtual machines [ C]//Proe of the 23rd Annual Computer Security Applications Conference. Piscataway, NJ: IEEE Press, 2007: 385- 397.
  • 9JIANG Xu-xian, WANG Xin-yuan, XU Dong-yan. Stealthy malware detection and monitoring through VMM-based " out-of-the-box" se- mantic view reconstruction [ J ]. ACM Trans on information and Systems Security,2010,13 (2) : 12-28.
  • 10SCHUSTER A. Searching for process and threads in Microsoft Win- dows memory dumps[ C ]//Proc of the 6th Annual Digital Forensic Research Workshop. Lafayette: EISEVI,2006 : 10-16.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部