메뉴 건너뛰기




Volumn , Issue , 2013, Pages 21-30

Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations

Author keywords

Attack Graph; Countermeasure Selection; Intrusion Detection; Software Defined Networking; Virtual Machine Introspection

Indexed keywords

ATTACK GRAPH; COUNTERMEASURE SELECTION; HYBRID INTRUSION DETECTION; SECURITY EVALUATION; SECURITY STRUCTURES; SOFTWARE-DEFINED NETWORKINGS; VIRTUAL MACHINE INTROSPECTION; VIRTUALIZED ENVIRONMENT;

EID: 84893525019     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.4108/icst.collaboratecom.2013.254107     Document Type: Conference Paper
Times cited : (12)

References (32)
  • 2
    • 84883472359 scopus 로고    scopus 로고
    • Server operational cost optimization for cloud computing service providers over a time horizon
    • Proceedings of the 11th USENIX conference on Hot topics in management of internet, cloud, and enterprise networks and services, ser.
    • H. Qian and D. Medhi, "Server operational cost optimization for cloud computing service providers over a time horizon," in Proceedings of the 11th USENIX conference on Hot topics in management of internet, cloud, and enterprise networks and services, ser. HotICE'11, 2011.
    • (2011) HotICE'11
    • Qian, H.1    Medhi, D.2
  • 4
    • 77949441598 scopus 로고    scopus 로고
    • Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction
    • Mar.
    • X. Jiang, X. Wang, and D. Xu, "Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction," ACM Transaction on Information and System Securirty, vol. 13, no. 2, pp. 12:1-12:28, Mar. 2010.
    • (2010) ACM Transaction on Information and System Securirty , vol.13 , Issue.2
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 5
    • 38149053957 scopus 로고    scopus 로고
    • Out-of-the-Box monitoring of VM-Based high-interaction honeypots
    • Recent Advances in Intrusion Detection, ser. C. Kruegel, R. Lippmann, and A. Clark, Eds. Springer Berlin Heidelberg, Jan.
    • X. Jiang and X. Wang, "Out-of-the-Box monitoring of VM-Based high-interaction honeypots," in Recent Advances in Intrusion Detection, ser. Lecture Notes in Computer Science, C. Kruegel, R. Lippmann, and A. Clark, Eds. Springer Berlin Heidelberg, Jan. 2007, no. 4637, pp. 198-218.
    • (2007) Lecture Notes in Computer Science , Issue.4637 , pp. 198-218
    • Jiang, X.1    Wang, X.2
  • 11
    • 77952336652 scopus 로고    scopus 로고
    • VMM-based hidden process detection and identification using lycosid
    • Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, ser. New York, NY, USA: ACM
    • S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau, "VMM-based hidden process detection and identification using lycosid," in Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, ser. VEE '08. New York, NY, USA: ACM, 2008, pp. 91-100.
    • (2008) VEE '08 , pp. 91-100
    • Jones, S.T.1    Arpaci-Dusseau, A.C.2    Arpaci-Dusseau, R.H.3
  • 13
    • 80755144012 scopus 로고    scopus 로고
    • Process out-grafting: An efficient "out-of-VM" approach for fine-grained process execution monitoring
    • Proceedings of the 18th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
    • D. Srinivasan, Z. Wang, X. Jiang, and D. Xu, "Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring," in Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS '11. New York, NY, USA: ACM, 2011, pp. 363-374.
    • (2011) CCS '11 , pp. 363-374
    • Srinivasan, D.1    Wang, Z.2    Jiang, X.3    Xu, D.4
  • 16
    • 0038687692 scopus 로고    scopus 로고
    • Scalable, graph-based network vulnerability analysis
    • Proceedings of the 9th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
    • P. Ammann, D. Wijesekera, and S. Kaushik, "Scalable, graph-based network vulnerability analysis," in Proceedings of the 9th ACM conference on Computer and communications security, ser. CCS '02. New York, NY, USA: ACM, 2002, pp. 217-224.
    • (2002) CCS '02 , pp. 217-224
    • Ammann, P.1    Wijesekera, D.2    Kaushik, S.3
  • 17
    • 34748883109 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • Proceedings of the 2nd ACM symposium on Information, computer and communications security, ser. New York, NY, USA: ACM
    • S. Jajodia, "Topological analysis of network attack vulnerability," in Proceedings of the 2nd ACM symposium on Information, computer and communications security, ser. ASIACCS '07. New York, NY, USA: ACM, 2007, pp. 2-2.
    • (2007) ASIACCS '07 , pp. 2-2
    • Jajodia, S.1
  • 20
    • 34547239511 scopus 로고    scopus 로고
    • A scalable approach to attack graph generation
    • Proceedings of the 13th ACM conference on Computer and communications security, ser. New York, NY, USA: ACM
    • X. Ou, W. F. Boyer, and M. A. McQueen, "A scalable approach to attack graph generation," in Proceedings of the 13th ACM conference on Computer and communications security, ser. CCS '06. New York, NY, USA: ACM, 2006, pp. 336-345.
    • (2006) CCS '06 , pp. 336-345
    • Ou, X.1    Boyer, W.F.2    McQueen, M.A.3
  • 22
    • 84872957282 scopus 로고    scopus 로고
    • Online. Available: http://openflow.org
    • "OpenFlow project," http://openflow.org/. [Online]. Available: http://openflow.org/
    • OpenFlow Project
  • 23
    • 84893582495 scopus 로고    scopus 로고
    • Online. Available: http://openvswitch.org
    • "Open vSwitch project," http://openvswitch.org/. [Online]. Available: http://openvswitch.org/
    • Open VSwitch Project
  • 27
    • 33747198726 scopus 로고    scopus 로고
    • Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
    • Sep.
    • L. Wang, A. Liu, and S. Jajodia, "Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts," Computer Communications, vol. 29, no. 15, pp. 2917-2933, Sep. 2006.
    • (2006) Computer Communications , vol.29 , Issue.15 , pp. 2917-2933
    • Wang, L.1    Liu, A.2    Jajodia, S.3
  • 28
    • 79958184435 scopus 로고    scopus 로고
    • A new alert correlation algorithm based on attack graph
    • Computational Intelligence in Security for Information Systems, ser. Springer
    • S. Roschke, F. Cheng, and C. Meinel, "A new alert correlation algorithm based on attack graph," in Computational Intelligence in Security for Information Systems, ser. Lecture Notes in Computer Science. Springer, 2011, vol. 6694, pp. 58-67.
    • (2011) Lecture Notes in Computer Science , vol.6694 , pp. 58-67
    • Roschke, S.1    Cheng, F.2    Meinel, C.3
  • 31
    • 84893601666 scopus 로고    scopus 로고
    • Available
    • "Volatility." [Online]. Available: https://code.google.com/ volatility/
    • "Volatility." [Online]


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.