Endpoint Configuration Compliance Monitoring via Virtual Machine Introspection

被引:0
作者
Kienzle, Darrell
Persaud, Ryan
Elder, Matthew
机构
来源
43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010) | 2010年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We describe a system for externally monitoring endpoint configuration compliance of an end user system that provides a high assurance monitoring function and data. Typical approaches to monitoring for endpoint configuration compliance rely on the integrity of the endpoint's operating system and do not protect the monitoring function from subversion or spoofing by threats from within the monitored system. Our approach utilizes (1) a virtual machine architecture on the endpoint system to protect the monitoring function and (2) virtual machine introspection of the end user's environment. In this paper we describe our approach to external monitoring of endpoint configuration compliance, present the technical details of our monitoring system, provide a description of sonic experimentation and observations, and discuss some of the issues associated with external monitoring
引用
收藏
页码:926 / 935
页数:10
相关论文
共 12 条
  • [1] BIONDI P, 2006, BLACKH EUR 2006 MAR
  • [2] CHEN P, 2001, HOTOS 8 MAY
  • [3] DOLANGAVITT B, 2008, DFRWS 2008 AUG
  • [4] Garfinkel T., 2003, 10 NETW DISTR SYST S
  • [5] JIANG X, 2007, ACM CCS 2007 OCT
  • [6] KORNBLUM J. D., 2007, DIGITAL INVESTIGATIO, V4
  • [7] Litty L., 2008, 17 USENIX SEC S JUL
  • [8] NORDAHLHAGEN P, 2008, OFFLINE NT PASSWORD
  • [9] RUSSMOVICH M, 2005, MICROSOFT WINDOWS IN
  • [10] RUTKOWSKA J, 2005, HACK BOX SEC C 2005