期刊文献+

基于VMM的虚拟机隐藏网络连接检测研究

Research on Virtual Machine Hidden Network Connections Detection Based on VMM
下载PDF
导出
摘要 恶意软件可通过隐藏自身行为来逃避安全监控程序的检测,具有较强的隐蔽性和不可察觉性。传统的基于主机的隐藏对象检测系统易被绕过或攻击而失效,针对当前研究中存在的对隐藏网络连接的检测较少,及在虚拟机监视器(VMM)中通过截获解析数据包难以维护可信网络连接视图的问题,提出基于硬件虚拟化的虚拟机隐藏网络连接检测方法。该方法在虚拟机内部获取网络连接的用户层及内核层视图;在VMM层截获虚拟机进程的系统调用获取可信网络连接视图及其与主体进程的映射关系;通过交叉视图对比实现对虚拟机隐藏网络连接的检测。实现的原型系统VNDec可在VMM层有效检测虚拟机中隐藏的网络连接,且可实现网络连接隐藏行为与进程主体的关联。 Malicious software can evade detection of security monitoring program by hiding its own behavior,which has strong concealment and imper⁃ceptivity.Traditional hidden objects detection systems based on host are liable to be bypassed or attacked,for the reason that current re⁃search about the detection of hidden network connections is less,and it’s difficult to maintain reliable network connections through inter⁃cepting and analyzing data packets in the VMM,proposes the detection method of virtual machine hidden network connections based on hardware virtualization.This method obtains the user layer and kernel layer view of network connections within virtual machine,captures the system calls of virtual machine process in VMM to obtain the credible network connections view and its mapping relationship with the process;and detects the hidden network connections by cross-view comparison.Realizes the prototype system of VNDec,and proves through experiments that the VNDec is effective in detecting the hidden network connections of virtual machine,and realizes the correla⁃tion between the hidden behavior of network connections and the process subject in the VMM layer.
作者 蔡梦娟 CAI Meng-juan(College of Cybersecurity,Sichuan University,Chengdu 610065)
出处 《现代计算机》 2019年第33期15-18,共4页 Modern Computer
关键词 隐藏网络连接 系统调用 语义重构 交叉视图 虚拟机监视器 Hidden Network Connections System Call Semantic Reconstruction Cross View Virtual Machine Monitor(VMM
  • 相关文献

参考文献2

二级参考文献18

  • 1怀进鹏,李沁,胡春明.基于虚拟机的虚拟计算环境研究与设计[J].软件学报,2007,18(8):2016-2026. 被引量:78
  • 2Silberman P, et al. FUTo uninformed[EB/OL]. 2006. [2010-12-10]. http://uninformed, org/?v= 3&a = 7&t = sumry.
  • 3Jones S T, Arpaci Dusseau A C, Arpaci-Dusseau R H. VMM-based hidden process detection and identification using Lycosid[C] //Proc of the 4th Int Conf on Virtual Execulion Environments (VEE08). New York: ACM, 2008:91-100.
  • 4Litty L, Lagar Cavilla H A, Lie I). Hypervisor support for identifying covertly executing binaries [C] //Proc of the 17th Conf on Security Symp. Berkeley: USENIX, 2008: 243-258.
  • 5Hoglund G. Kernel object hooking rootkits (KOH rootkits) [EB/OL]. 2006. [2008-12-10], http://www, rootkit, corn/ newsread, php?newsid: 501.
  • 6lntel Corporation. Intel: 64 and IA-32 architectures software developer's manual volume 3A: System programming guide, Part 1 [EB/OL]. 2010. [2010-12-10]. http: //www. intel. com/Assets/PDF/manual/253 668. pdf.
  • 7Riley R, Jiang X, Xu D. Multi aspect profiling of kernel rootkit behavior [C] //Proc of the 4th ACM European Conf on Computer Systems (EuroSys 09). New York: ACM, 2009:47-60.
  • 8Garfinkel T, Rosenblum M. A machine introspection-based architecture for intrusion detection [C] //Proc of the 10th Network and Distributed System Security Symp. Washington DC: Internet Society, 2003:191-206.
  • 9Litty L, Lie D. Manitou: A layer-below approach to fighting malware [C]//Proc of the Workshop Architectural and System Support for Improving Software Dependability (ASID 06). NewYork: ACM, 2006:6-11.
  • 10Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization [C]//Proc of the 19th ACM Syrup on Operating Systems Principles (SOSP 03). New York: ACM, 2003: 164-177.

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部