A practical and light-weight data capture tool for Xen virtual machine

Size: px
Start display at page:

Download "A practical and light-weight data capture tool for Xen virtual machine"

Transcription

1 A practical and light-weight data capture tool for Xen virtual machine NGUYEN ANH QUYNH, YOSHIYASU TAKEFUJI Graduate School of Media and Governance, Keio university 5322 Endoh, Fujisawa, Japan JAPAN Abstract: Honeypot is a common solution to investigate attacker s activities, but the data capture tool, one of the key components of high-interaction honeypot architecture, faces a major difficulty: it is very hard to hide its presence. For example Sebek, the de-factor data capture tool, suffers from this problem: the intruder can easily uncover it even without privileged access right. This paper presents a design and implementation of a light-weight camera software in Xen virtual machine environment: the camera can be put into the virtual machine honeypot to gather necessary data about intruder s action. The camera tool is named XenKamera, which aims to collect TTY data from consoles of observed honeypot, then replays the collected data in on-line or off-line manner as the administrator wishes. Simply put, XenKamera allows us to watch the intruder as if we were looking over his shoulder while he is typing. In order to prevent the intruder from discovering XenKamera, a special architecture is proposed, so the data recording process becomes stealth, hard to detect and circumvent. To protect the gathered data, the TTY logging is secretly transferred to a separate virtual machine and safely kept there. Experiments demonstrate that XenKamera is effective and reliable. Besides to serve for honeypot purpose, XenKamera is designed to be so light-weight that it is practical and can also be used in the production systems to record the working sessions, and the administrator can rely on the logging data to investigate and trouble-shoot administration. Key Words: Xen virtual machine, Linux, honeypot, data capture tool, stealth communication, keylogger, TTY logging, computer administration. 1 Introduction Honeypot ([1], [2], [3], [4]) is a computer system with the purpose: to lure attacker in order to gather information about threats. These collected information is used to better understand threats, how they are evolving and changing, in order to counter those threats in the best way possible. If applying the honeypot technology properly, we can discover the novel attack patterns and unknown security holes. Honeypot also helps to study the attacker s motives. The high-interaction honeypot consists of 3 key components: Data control: this component is used to contain the intruder s activities and ensure that he does not cause any harm to other production systems outside the honeypot. Data capture: a honeypot must capture all the activities within the honeypot, including the information entered and left the system. Data collection: the gathered information got from the capture component must be securely and secretly forwarded to a central data server. This allows data captured from various honeypot sensors to be centrally collected for analysis and archiving. Sebek ([5]) is a de-factor, widely-used tool in current honeypot technology. Sebek architecture consists of 2 key components: a kernel module run on the honeypot system, and a central server to collect data. The first component, Sebek kernel module, serves as the data capture tool, and can capture intruder s activities in the honeypot. It also serves as a part of the data collection component: the collected data is then transferred by this module to a Sebek server (sebekd) running on a central machine, and then analyzing process is taken there with some utilities provided with Sebek package. One of the vital requirements of the data capture component is: it must be as covert as possible, so the intruder never knows that he is under watch eye. To satisfy that demand, Sebek kernel module applies many tricks borrowed from the black-hat community. Unfortunately these tricks are still not good enough to cover Sebek: researchers have pointed out many

2 methods to detect Sebek s presence, and some of them to uncover and defeat. Here are 8 outstanding problems of Sebek: are not even required privileged access. Another potential problem of Sebek is that the (1) Unprivileged local user can run a simple command that generates big input or output data, such data collection component run on the central server must expose to the network to capture data forwarded as the dd-attack method proposed in [9], then from honeypots, so this server must be protected at all checks to see if the network performance is decreased with ping command. The reason is that cost. Otherwise the attacker will bring it down, then he can do anything he likes to the honeypot he broken the data captured from all the input and output are in without worrying that he is being observed. secretly forwarded to the central sebekd server via This paper proposes a novel approaches to eliminate these problems of Sebek. A design and imple- network stack, and this activity may lead to congest network if the data is enormous. mentation of a light-weight data capture tool named XenKamera, which works in Xen virtual machine ([6], [7]) environment, will be presented. XenKamera focuses on capturing only TTY data of the honeypot, and is able to function much more stealthily and quietly than Sebek. All the recording data are not saved on the local honeypot, but secretly transferred to a central server and safely kept there. This leaves absolutely no chance to the intruder to find out or delete the previous logging data. Meanwhile, the collection logging daemon is not necessarily exposed on the network, and that improves the security of the whole honeypot architecture. To make the solution more practical, XenKamera is designed so the overhead is very negligible and overall it makes almost no impact to the system it runs on. Consequently, XenKamera can be also used for production systems to transparently record the working sessions, so the administrator can rely on it to investigate and carry out forensic process to recover broken system made by mistaken operations. The rest of this paper consists of 4 sections: The 2nd section outlines some problems with current capture tools (specifically focus on Sebek). The 3rd section proposes XenKamera architecture. The next section discusses some issues in XenKamera design and an experience we had while experimenting it. Section 5th summaries related works, and finally conclusion closes this paper in the 6th section. 2 Sebek s Problems As mentioned above, Sebek is the de-factor, widelyused data capture tool in honeypot technology ([8]). The reason is obviously: being inside the kernel, Sebek has the opportunity to capture all the necessary data including keystrokes, input and output data from file system or network socket, while it can control the whole system as it wants. Sebek even patches the kernel to hide its presence from system users, so the intruder would have hard time to discover its existence. Unfortunately while many efforts are put on Sebek to make it more stealthy, Sebek is still rather easy (2) Though Sebek tries to patch the network stack to hide the actual network statistics when using network layer to send data, we can still compare the internal statistics got from inside the kernel with what the system shows to user-space ([9]). The difference will disclose the presence of Sebek. (3) Sebek inserts a kernel module into the system, and this module could be listed in the kernel module list (with lsmod command on Linux). Though we can try to hide it with another kernel module (like the clean method proposed by adore-ng [10]), Sebek module can still be found with a brute-force scanning technique [11]. (4) Sebek replaces some system-calls with its own functions. Paper [12] exploits this fact to propose another way to discover Sebek: we just need to check if the address of these system calls are at abnormal places in the memory. If that is the case, chances are Sebek is present in the kernel. (5) Sebek replaces some system-calls with the code that packs the data into UDP packets and send them out to the sebekd machine. This change significantly increases the time to complete the system-calls, and the difference (more than 3 times in the case of read() system-call [12]) can be easily recognized from user-space by unprivileged user. (6) After detecting Sebek, the intruder can remove it by recovering the original system call (for example with unsebek.c tool in [13]). The fact that Sebek is a kernel module makes it easier to do that. (7) Sebek sends the captured data to the central server via network. If the intruder has a sniffer (such as tcpdump [14]) installed at the right place in the network, he will see these data and easily figure out that the system he has penetrated is a honeypot. (8) The central server must expose to the network to receive data sent from the honeypot. That will

3 tempt the intruder to attack this server to bring Xen community is working hard to gradually down this fundamental component of our honeypot. This is not a theory, but the actual threat: every Linux users. The process is expected to start push Xen into Linux kernel, so it will be available for Paper [15] proposes such a method, in which sebekd will be taken over if it uses a libpcap library from kernel with Xen version 3.0. with buffer overflow bug. Xen Architecture As we see, there are too many problems with the current Sebek, and they all make honeypot less attractive solution for security practices. 3 XenKamera Solution Traditionally, honeypots have been physical systems on a dedicated network, with multiple physical machines to monitor and collect logging data from the honeypots. The requirement resources posed by honeypot prevent it become a common network security solution. The advent of virtual machines such as Xen has made setting up honeypots far easier. Instead of a set of physical machines, the honeypot is now the Xen virtual machine with the host filtering and monitoring network traffic and collecting logs. Even better, one Xen host can have multiple honeypots running on it, and those honeypots can be configured in a realistic virtual network, with each plays a specific role: data control, data capture or data collection. Our solution XenKamera is based on Xen, and take some advantages provided by Xen to address the outstanding problems which Sebek currently experiences. Because XenKamera is made to work in Xen environment, we will first take a brief look at Xen technology, and then discuss more about XenKamera s design and implementation. 3.1 Xen Virtual Machine Xen is a virtual machine monitor initially developed by the University of Cambridge Computer Laboratory and now promoted by various industrial monsters like Intel, AMD, IBM, HP, RedHat, Novel and by the whole open source community. Being released under the open source GNU GPL license, Xen can be used to partition a machine to support the concurrent execution of multiple operating systems (OS). Commodity OS (now officially Linux, FreeBSD, NetBSD are supported) can run on Xen with small changes to the kernel. Xen is outstanding because the performance overhead introduced by virtualization is negligible: the slowdown is around 3% only ([16]). Various practices take the advantages offered by Xen, such as server consolidation, co-located hosting facilities, distributed services and application mobility. Basically, Xen is a thin layer of software above the bare hardware, and Xen exposes a virtual machine abstraction that is slightly different from the underlying hardware. In Linux, Xen introduces a new architecture called xen, which is very similar to x86 architecture. The virtual machine (VM) executing on Xen are modified (at kernel level) to work with xen architecture. All the accesses of DomUs to the hardware and peripherals must go through Xen, so Xen can keep the close eye to those VMs and control all the activities. Running on top of Xen, VM is called Xen domain, or domain in short. A privileged special domain named Domain0 (or Dom0 in short) always runs. Dom0 manages other domains (called User Domain, or DomU in short), including jobs like start, shutdown, reboot, save, restore and migrate them between physical machines. Because all the domains run on the same machine, they can share physical resources such as memory, hardware interrupt, and peripherals. Note that all of those sharing must be approved by Xen after all. 3.2 XenKamera Design Goals and Approches XenKamera is designed with the aim to overcome 8 problems experienced by Sebek we discussed above. 1. The first goal of XenKamera is to be the capture data tool for the honeypot architecture. Regarding this, we see that Sebek tries to capture all the I/O data in the system, including the I/O data from console, file-system and network socket. In some experiments we have carried out, we found that in many cases, we were most interested in the session data generated by console, which shows us what the intruder had typed at his console when he broken in the honeypot. These information will disclose quite a few things about the goals, motives and attitude of the intruder. This observation leads us to a decision: XenKamera should focus on capturing only the data from console sessions, but not the data from file-system or network socket like Sebek does. These I/O data from consoles show us not only what the intruder types in, but also the output data returned by the system, exactly as what he receives on his screen. In Unix-derived systems,

4 the communication layer that allows users to access the local and remote physical/virtual devices is the TTY subsystem. By hooking to TTY subsystem and capturing TTY data, we can gather the I/O user data even if the session is encrypted (for example when the intruder logs in via SSH service). The other benefit is that only dealing with TTY data (instead of capturing everything like Sebek does) makes XenKamera very light-weight, since the amount of data produced by console layer is usually pretty small. Moreover, as we choose to put the capture code at the TTY layer, but not in the critical path like Sebek does (Sebek gets the data by patch the systemcalls which leads to very high overhead), the performance impact of XenKamera is very negligible. Consequently the problem (5) of Sebek mentioned above is much more mitigated. Besides that, since we no longer patch the systemcall, our solution defeats the problem (4) of Sebek. In order to capture the console data, we must modify the DomU s kernel in TTY layer. TTY layer is the subsystem that manages all the input and output data concerning console sessions. Patching at the right place makes XenKamera support most type of TTYs: virtual console, BSD console, unix98-style PTYs (xterm/ssh), serial, ISDN, etc. 2. Another target of XenKamera is to secretly send the logging data to the collection machine. In contrast with Sebek, which exploits network stack to transfer data out, we will instead take the advantage of Xen to send the data out via shared memory. Since all the domains run on the same physical machine, they can share memory with each other. Thanks to Xen intercommunication mechanisms, we can establish a shared memory between DomU, the virtual machine we are trying to run XenKamera on, and Dom0. DomU puts all the gathered data from TTY layer in the shared memory, then notifies Dom0 to pick up them. Obviously with this scheme, data is no longer sent out through the network stack, thus the process becomes more quietly, stealthily, and subsequently XenKamera can defeat the problems (1), (2), (5) and (7) Sebek currently suffers. In addition, there is one more merit of this solution: data is sent via shared memory (but not network stack), the overall reliability and efficiency is significantly increased. 3. With the strategy of exchanging data between DomU and Dom0 via shared memory, we run a daemon process in Dom0 to pick up logging data forwarded out by DomU. Because all the communication is done via shared memory and other Xen communication mechanisms, the whole process is not carried out on the network. Consequently the daemon process is not necessarily exposed on the network like sebekd does, thus our approach does not face the problem (8) of Sebek. Because Xen provides strict isolation between DomU and Dom0, even if the intruder knows that he is under observation, he cannot access or modify the logging data kept in Dom0. This advantage still stands even if he somehow gains the ultimate privileges of root user. 4. Besides a small patch at the right place of TTY layer of DomU, we propose that XenKamera is applied in a whole as a patch to the DomU s kernel, but not as a kernel module like Sebek s approach. With this trick, we are not worried any more about hiding kernel module as Sebek does, and it is also more difficult for the intruder to remove XenKamera from kernel. Therefore, the problem (3) of Sebek is addressed with our approach, while the problem (6) is much more relieved (we will discuss further on this later). 5. The final goal is XenKamera must be flexible, so the administrator can disable or enable it as he desires at run-time. All of those goals and approaches lead us to the architecture for XenKamera as followings XenKamera Architecture XenKamera consists of 3 main components: The camera device in DomU, which plays as a data capture tool (kamerau); the camera recorder in Dom0, which plays as a data collection daemon (xenkamerad); and camera utilities in Dom0 (including camera player, keystroke extractors and others). The overall architecture of XenKamera is outlined as in Figure 1. Camera device in DomU: kamerau is a kernel code XenKamera put in kernel-space of DomU. This code patches and hooks into the TTY core layer of DomU to capture TTY data. The captured TTY events are open (new console is opened), deinitialized (a console is cleaned up before closing), read (there is data to input), and write (there is data to output) events. The collected data together with event information is delivered to Dom0 via a shared memory between DomU and Dom0. To be flexible, kamerau can be disabled and enabled by an instruction sent from Dom0 s user-space. When inactive, it costs no overhead in the DomU.

5 memory, and it works in asynchronous way. Consequently the user/intruder never see any difference while working on a XeKamera-powered system. In contrast, our measurements on Sebek in the same set of tests show that Sebek cost up to nearly 950%: the reason is Sebek choose to patch the system-calls (but not the TTY layer as XenKamera does) to capture data, and the system-calls are especially sensitive to any change. This is also a major problems of Sebek: the intruder can easily figure out that Sebek is running with some simple benchmarks. Our evaluation demonstrates that XenKamera is a much more effective solution as a keystroke/tty logger than Sebek. While XenKamera is able to observe DomUs, we do not intend to watch the control domain (Dom0), because Dom0 is the trusted domain. The administrator must protect the Dom0 at all cost, as if the intruder Figure 1: XenKamera architecture takes over Dom0, the game is over: he can do anything he likes to other DomU. Normally it is a good idea to run Dom0 without network address, so the outsider Camera recorder: xenkamerad runs in user-space of Dom0 to record TTY data sent from kamerau. This daemon process patiently waits for the notifications on the new data from kamerau. If it detects that the new data arrived, it gets the data from the shared memory between Dom0 and DomU above, then saves the have less chance to attack it. XenKamera provides patches for DomU in 2 places: TTY hooks and kamerau. These codes are applied on DomU s kernel as built-in, so they are not shown in the kernel module list (with lsmod command), and consequently we cut down one chance for data into separate logging files for each domain respectively. the intruder to detect XenKamera s presence. This Camera utilities: Once having the TTY logging data from camera recorder in the above step, we need to replay it or analysis these data. XenKamera provides 2 key tools: a player (ttyreplay) and a keystroke extractor (xkeys). With the player, the administrator can replay the data in on-line manner, when the intruder is typing at his console, so the administrator can follow the intruder lively. On the other hand, the administrator can also replay TTY logging data in off-line manner by picking up any off-line logging file and replay it later, when the intruder has already gone. In case the administrator is only interested in what the approach also makes it harder to remove XenKamera from the memory if the intruder wants to do that. There might be one more place the intruder can investigate to discover XenKamera s presence: kernel binary and kernel symbol files. Fortunately, in Xen architecture DomU is run by loading the kernel from Dom0, so we will not need to have kernel binary file, together with kernel symbol files in DomU s file system. Last but not least, all the path to the kernel memory should be prohibited, as the intruder might somehow get the root access in DomU and use that privilege to access the kernel internal and modify intruder typed (not the output screen, which shows the it to disable XenKamera. In order to prevent this result of the command the intruder runs), he can use the keystroke extractor to extract the keystrokes from the logging data. With this tool, the administrator can problem, DomU s kernel should be compiled with /dev/{kmem,mem,port} removed ([17]), and the ability of loading kernel module at run-time should be quickly take a look and figure out what the intruder is eliminated, too. This can lead to some objections: doing or already done to the honeypot. the honeypot becomes too restrictive, and the attacker might suspect. But we argue that this kind of harden environment is increasingly popular, and it should be 4 Discussion expected by the attacker on any production systems. In the current solution, Dom0 has a difficulty in We have done some experimental with XenKamera and found that its impact is very negligible: on average the overhead is around only 19% when the data is input or output to the console. The reason is obvious: XenKamera forwards data to Dom0 via shared understanding the domain-level semantic data in the TTY logging files it records. For example, TTY logging data saves meta-information about user-id, who opens and generates the console data. But the userid is only meaningful in the domain that produces the

6 logging, but not in Dom0. The reason is that the TTY logging data is collected from inside DomU s kernel, but the kernel is only aware of the user-id (which is a number), and user-name is something only available in user-space level. Consequently, the administrator who runs xenkamerad in Dom0 to gather TTY logging can only identify the logging user by his user-id, but not by his user-name. This problem can be solved by 2 solutions: either Dom0 keeps the user database of all the DomU (the /etc/passwd file of DomU is suitable for this purpose), or DomU should inform Dom0 the user-name instead of the user-id. But no solution is perfect: with the first method, Dom0 must always update the database, which can be changed dynamically. On the other hand, the second method requires DomU s kernel to read the data in user-space, and there is no good and clean way to do that. So at the moment, we are temporarily content with the current solution, and look to improve it in the future. As XenKamera is very light-weight, we also propose to use it to record the TTY working sessions. We made an experiment: in our test-bed Xen system, we run one Xen virtual domain with XenKamera. On this domain, we have an apache web server, which hosts documentations for local network. In 3 month, we collected 218 logging files, with totally 37906KB in size. These data consist of the logging files about all the console sessions generated when the administrators logged in via SSH to download/upload documentations and to reconfigure the apache server. During this time, once our web server had a problem: users could not find the documentations on the server any more. We replayed all the logging files of the previous day, and figured out the problem: in one SSH session, one administrator logged in, and used vim editor to open the apache configured file, then he changed one option of apache by mistaken. The error made apache looked into the wrong virtual directory for the documentations it hosts. The trouble was quickly examined and fixed. Obviously, this problem is hard to explain without XenKamera logging files. This experience shows us that XenKamera can be a good tool to trouble-shoot the administration. 5 Related Works Honeypot is one of the hottest topics on security research fields. Many papers focus on applying honeypot to improve defense system or to trap malwares. The honeypot can be broken down into 2 kinds: lowinteraction and high-interaction type. The low-interaction honeypots have limited interaction: they normally work by emulating services and operating systems. Attacker activity is limited to the level of emulation by the honeypot. Honeyd ([18]) can emulate TCP/IP stack and simulate network behavior, is one of the most popular honeypot of this type. The Honeynet ([2]) is the high-interaction honeypot, which is the main research topic of this paper. A honeynet may contain one of more honeypots, and Sebek plays a key-role in a honeypot, with the job is to capture the intruder s activities. Though Sebek is a popular tool in the honeypot community, there are very few papers that discuss the weak points of honeypot or propose methods to improve Sebek, which are related to the topic of this paper. In [13] and [15], J.Corey points out some problems with honeypot, especially with Sebek, and several methods were proposed to defeat it. M.Dornseif and T.Holz also presents few other methods to detect and exploit Sebek in [9] and [12]. Our paper tries to investigate all the current outstanding problems of Sebek, and proposes XenKamera as a solution to address or mitigate them. There are many attempts to capture keystrokes and TTY logging for either administration or security purpose. Basically we can divide them into 2 kinds: user-space-based and kernel-space-based solutions. The user-space solutions run in user-space, and they capture the keystroke either by poking at I/O port ([19], [20], [21]), or intercepting TTY file descriptor ([22]). They all have same drawbacks: easy to uncover and disable. Kernel-based solutions are favorable, because they are much harder to detect. They can even stay invisible, and usually only be detected by privileged users with special techniques. Two of the most famous keystroke and TTY logger kits are vlogger ([23]), and ttyrpld ([24]). vlogger is a Linux kernel-based key logger. It is a favorite tool of black-hat community, and is usually installed on a penetrated Linux system to steal information typed at console (user-name and password are the most wanted). vlogger intercepts TTY internal function to record keystrokes and either saved to local file system, or send them out to another machine. It also tries to evade the network level probes by patching the network stack. Nevertheless this kit does not give us the output screen-shots like TTY-based solution, and can be easily detected by a sniffer (like tcpdump) placed on separately independent machine in the same broadcast domain. Simply put, it shares many problems with Sebek. ttyrpld is the TTY capture solution for multiple Operating Systems (currently Linux, FreeBSD and OpenBSD are supported). Also based on kernel, ttyrpld is difficult to circumvent, and has ability to log any TTY type (including virtual console, bsd/unix98 pty, serial, isdn). Even better, the overhead impact to the

7 system is quite low. In order to get TTY data, ttyrpld Sebek, a data capture tool widely-used in honeypot patches OS kernel and put some hooks in TTY core technology. We demonstrated that XenKamera can layer. On Linux, the hooks are taken advantage by a kernel module which attach its own functions to these hooks to gather TTY data. The information is then transferred to user-space via a software device (put at /dev/rpl). ttyrpld also provides a player named ttyreplay to replay the saved logging data, and the administrator be employed instead of Sebek for honeypot purpose in Xen environment, and if being installed in a strict manner, XenKamera is stealthier and harder to detect, even with privileged user. Our solution is also more flexible, effective and reliable than Sebek. Moreover, XenKamera is practical for production can watch those date in real-time or off-line system, because it causes very little overhead. We manner. Overall, ttyrpld is a very nice tool. Unfortunately, ttyrpld is not suitable for the purpose of secret watching the intruder, because there are too many clues about its presence: ttyrpld requires a process daemon (rpld) to run in user-space, and it also installs a device at /dev/rpl in the system. In addition, the kernel module of ttyrpld named rpldev can propose to use XenKamera to record working operations, and the data collected might help to troubleshoot daily administration. At the moment XenKamera only works for Linux-based DomU. We plan to provide support for other OSes such as FreeBSD, NetBSD once these ports are working stably on Xen. be listed with lsmod command. All of these evidences can be spotted even with an unprivileged user. Consequently the intruder will quickly realize that he is being observed. References: Last but not least, ttyrpld saves all the logging [1] Lance Spitzner. Honeypots: Tracking hackers. Addison-Wesley Professional publisher, data in the local file system (by default at /var/log/rpl/ directory), the intruder with privileged access can September delete all the valuable logging data to cover his footprints. [2] The Honeynet Project. Know your enemy: Our solution XenKamera is initially inspired by Honeynets. ttyrpld, but is able to address all the mentioned drawbacks of ttyrpld: XenKamera can record all the TTY papers/honeynet/, May data from the intruder s console like ttyrpld, but it [3] The Honeynet Project. Know Your Enemy: works quietly in kernel space of Xen domain and leave no trace for the intruder to be suspicious about its existence. GenII Honeynets. org/papers/gen2/, May XenKamera has no daemon process run in user-space, no device is necessary in /dev, while it [4] Edward Balas and Camilo Viecco. Towards a never send out any information via network stack like vlogger does. Finally, it never keeps any logging data in the local file-system. Third Generation Data Capture Architecture for Honeynets. In The 6th IEEE Information Assurance Workshop, June All of these characteristics make XenKamera pretty hard to discover, and suitable for honeypot purposeemy: [5] The Honeynet Project. Know your en- Sebek. Our paper somewhat shares the similar ideas with org/papers/sebek.pdf, November our previous work name Xebek project [25], but is different in the scope: while Xebek tries to capture all the I/O related data (similar to what Sebek does, but Xebek is able to fix almost all the problems of Sebek [6] Boris Dragovic, Keir Fraser, Steve Hand, Tim Harris, Alex Ho, Ian Pratt, Andrew Warfield, Paul Barham, and Rolf Neugebauer. thanks to its special architecture), the XenKamera tool focuses only on gathering TTY data. This approach makes XenKamera more light-weight, and practical for production systems. [7] Ian Pratt, Keir Fraser, Steven Hand, Christian Limpach, Andrew Warfield, Dan Magenheimer, Jun Nakajima, and Asit Mallick. Xen 3.0 and the art of virtualization. In Proceedings of the 2005 Ottawa Linux Symposium, Ottawa, Canada, July Conclusions This paper proposes the design and implementation of XenKamera solution for Xen-based systems, with the aim to eliminate some outstanding problems of [8] The Honeynet Project. Honeywall CDROM. cdrom/index.html/, May 2005.

8 [9] Maximillian Dornseif, Thorsten Holz, and [23] rd. Writing Linux kernel keylogger. Christian Klein. NoSEBrEaK - Attacking honeynets. In The 5th Annual IEEE Information As- p=59&a=14, July surance Workshop, June [10] stealth. adore-ng rootkit org/rootkits/, March [11] madsys. Advanced incident response tool. airt-linux/, August [12] Thorsten Holz. Detecting honeypots and other suspicious environments. In Proceedings of the 6th IEEE Information Assurance Workshop, June [13] Joseph Corey. Local honeypot identification. unofficial/p62/p62-0x07.txt, September [14] tcpdump project. org, October [15] Joseph Corey. Advanced honeypot identification and exploitation. org/unofficial/p63/p63-0x09.txt, January [16] E. Dow S. Evanchik M.Finlayson J. Herne J.N.Matthews B. Clark, T. Deshane. Xen and the art of repeated research. In Proceedings of the Usenix annual technical conference, Freenix track., pages , July [17] sd. Linux on-the-fly kernel patching. p=58&a=7, July [18] Niels Provos. A virtual honeypot framework. In The 13th USENIX Security Symposium, August. [19] Linux Key Logger. spine-group.org/tools/lkl tar.gz, August [20] Uberkey. nu/uberkey/uberkey-1.2.tar.gz, November [21] unixkeylogger. linuxsecurity.com/exploits/ rootkits/unixkeylogger.c, August [22] snoop. July [24] Jan Engelhardt. TTY logging daemon project. July [25] Nguyen Anh Quynh and Yoshiyasu Takefuji. A novel approach to secured and central logging data. In 4th WSEAS International Conference on Information Security, Communications and Computers (ISCOCO 2005), December 2005.

A Novel Stealthy Data Capture Tool for Honeynet System

A Novel Stealthy Data Capture Tool for Honeynet System A Novel Stealthy Data Capture Tool for Honeynet System NGUYEN ANH QUYNH, YOSHIYASU TAKEFUJI Graduate School of Media and Governance Keio University 5322 Endoh, Fujisawa, 252-8520 JAPAN Abstract: Data capture

More information

Towards an Invisible Honeypot Monitoring Tool. Hack.Lu2006

Towards an Invisible Honeypot Monitoring Tool. Hack.Lu2006 Towards an Invisible Honeypot Monitoring Tool Hack.Lu2006 Nguyen Anh Quynh Keio university, Japan Who am I? Nguyen Anh Quynh, a PhD student of Takefuji-lab, Keio university, Japan

More information

Xen and the Art of Virtualization

Xen and the Art of Virtualization Xen and the Art of Virtualization Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield Presented by Thomas DuBuisson Outline Motivation

More information

Virtual machine architecture and KVM analysis D 陳彥霖 B 郭宗倫

Virtual machine architecture and KVM analysis D 陳彥霖 B 郭宗倫 Virtual machine architecture and KVM analysis D97942011 陳彥霖 B96902030 郭宗倫 Virtual machine monitor serves as an interface between hardware and software; no matter what kind of hardware under, software can

More information

Honeynet Data Analysis: A technique for correlating sebek and network data

Honeynet Data Analysis: A technique for correlating sebek and network data Honeynet Data Analysis: A technique for correlating sebek and network data Edward G. Balas Indiana University Advanced Network Management Lab 6/15/2004 About the Author Edward G. Balas Security Researcher

More information

Xen and the Art of Virtualization

Xen and the Art of Virtualization Xen and the Art of Virtualization Paul Barham,, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer,, Ian Pratt, Andrew Warfield University of Cambridge Computer Laboratory Presented

More information

Dynamic Translator-Based Virtualization

Dynamic Translator-Based Virtualization Dynamic Translator-Based Virtualization Yuki Kinebuchi 1,HidenariKoshimae 1,ShuichiOikawa 2, and Tatsuo Nakajima 1 1 Department of Computer Science, Waseda University {yukikine, hide, tatsuo}@dcl.info.waseda.ac.jp

More information

A Distributed Intrusion Alert System

A Distributed Intrusion Alert System A Distributed Intrusion Alert System Chih-Yao Lin, Hsiang-Ren Shih, and Yomin Hou Taiwan National Computer Emergency Response Team {chinyao, shr, yominhou}@twncert.org.tw Abstract In this paper, a distributed

More information

Honey Pot Be afraid Be very afraid

Honey Pot Be afraid Be very afraid Honey Pot Be afraid Be very afraid Presented By Shubha Joshi M.Tech(CS) Problems with internet Why? Problems The Internet security is hard New attacks every day Our computers are static targets What should

More information

Security Architecture

Security Architecture Security Architecture We ve been looking at how particular applications are secured We need to secure not just a few particular applications, but many applications, running on separate machines We need

More information

Principles of ICT Systems and Data Security

Principles of ICT Systems and Data Security Principles of ICT Systems and Data Security Ethical Hacking Ethical Hacking What is ethical hacking? Ethical Hacking It is a process where a computer security expert, who specialises in penetration testing

More information

A fault tolerance honeypots network for securing E-government

A fault tolerance honeypots network for securing E-government A fault tolerance honeypots network for securing E-government Shahriar Mohammadi Bahman Nikkhahan smohammadi40@yahoo.com Nikkhahan@sina.kntu.ac.ir Information Technology Engineering Group, Department of

More information

HONEYNET SOLUTIONS. A deployment guide 1. INTRODUCTION. Ronald C Dodge JR, Richard T Brown, Daniel J Ragsdale

HONEYNET SOLUTIONS. A deployment guide 1. INTRODUCTION. Ronald C Dodge JR, Richard T Brown, Daniel J Ragsdale HONEYNET SOLUTIONS A deployment guide Ronald C Dodge JR, Richard T Brown, Daniel J Ragsdale United States Military Academy Abstract: Key words: Honeynets provide network and system managers a unique intrusion

More information

MODERN SYSTEMS: EXTENSIBLE KERNELS AND CONTAINERS

MODERN SYSTEMS: EXTENSIBLE KERNELS AND CONTAINERS 1 MODERN SYSTEMS: EXTENSIBLE KERNELS AND CONTAINERS CS6410 Hakim Weatherspoon Motivation 2 Monolithic Kernels just aren't good enough? Conventional virtual memory isn't what userspace programs need (Appel

More information

WB-Analysis of the Nakula & Antareja Incident

WB-Analysis of the Nakula & Antareja Incident WB-Analysis of the Nakula & Antareja Incident A WB-Analysis of a system security-related incident 5.5th Bieleschweig Workshop Bielefeld, June 6-7 2005 Overview Introduction The WB-Analysis Conclusion Discussion

More information

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1492 Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE,

More information

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control Last time Security Policies and Models Bell La-Padula and Biba Security Models Information Flow Control Trusted Operating System Design Design Elements Security Features 10-1 This time Trusted Operating

More information

Firewall Identification: Banner Grabbing

Firewall Identification: Banner Grabbing Honey POt Firewall Identification: Banner Grabbing Banners are messages sent out by network services during the connection to the service. Banners announce which service is running on the system. Banner

More information

What a Honeynet Is H ONEYPOTS

What a Honeynet Is H ONEYPOTS 79_HONEY.ch02 Page 9 Thursday, August 9, 2001 10:17 AM 2 What a Honeynet Is H ONEYPOTS The concept of honeypots has been around for years. Simply put, honeypots are systems designed to be compromised by

More information

Xen and the Art of Virtualiza2on

Xen and the Art of Virtualiza2on Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian PraF, Andrew Warfield University of Cambridge Computer Laboratory Kyle SchuF CS 5204 Virtualiza2on Abstrac2on

More information

Guide to Computer Forensics. Third Edition. Chapter 11 Chapter 11 Network Forensics

Guide to Computer Forensics. Third Edition. Chapter 11 Chapter 11 Network Forensics Guide to Computer Forensics and Investigations Third Edition Chapter 11 Chapter 11 Network Forensics Objectives Describe the importance of network forensics Explain standard procedures for performing a

More information

Comparative Study of Different Honeypots System

Comparative Study of Different Honeypots System International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 2, Issue 10 (August 2012), PP. 23-27 Ashish Girdhar 1, Sanmeet Kaur 2 1 Student

More information

Modelling the costs and benefits of Honeynets

Modelling the costs and benefits of Honeynets Modelling the costs and benefits of Honeynets Maximillian Dornseif Sascha A. May May 3, 2004 For many IT-security measures exact costs and benefits are not known. This makes it difficult to allocate resources

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information

The Future of Virtualization

The Future of Virtualization The "anyos" paradigm and its implications through virtualization 30 December 2005 22c3 Berlin Introduction Tools The Future Introduction Application Area Theorie What is Virtualization? Virtualization

More information

Journal Online Jaringan COT POLIPD (JOJAPS) Network Defender with Fake Server: A New Way for Network Protection

Journal Online Jaringan COT POLIPD (JOJAPS) Network Defender with Fake Server: A New Way for Network Protection JOJAPS eissn 2504-8457 Abstract Journal Online Jaringan COT POLIPD (JOJAPS) Network Defender with Fake Server: A New Way for Network Protection Mohd Tamizan Abu Bakar 1, Mariati bt Mad Samad 1 & Akhyari

More information

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand

Spring 2017 :: CSE 506. Introduction to. Virtual Machines. Nima Honarmand Introduction to Virtual Machines Nima Honarmand Virtual Machines & Hypervisors Virtual Machine: an abstraction of a complete compute environment through the combined virtualization of the processor, memory,

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

Virtual Machines Disco and Xen (Lecture 10, cs262a) Ion Stoica & Ali Ghodsi UC Berkeley February 26, 2018

Virtual Machines Disco and Xen (Lecture 10, cs262a) Ion Stoica & Ali Ghodsi UC Berkeley February 26, 2018 Virtual Machines Disco and Xen (Lecture 10, cs262a) Ion Stoica & Ali Ghodsi UC Berkeley February 26, 2018 Today s Papers Disco: Running Commodity Operating Systems on Scalable Multiprocessors, Edouard

More information

International Journal of Advancements in Research & Technology, Volume 2, Issue 6, June ISSN

International Journal of Advancements in Research & Technology, Volume 2, Issue 6, June ISSN International Journal of Advancements in Research & Technology, Volume 2, Issue 6, June-2013 53 Dynamic Honeypot Construction Amanjot Kaur Assistant Professor S.D.S.P.M. College for Women, (Rayya), Amritsar,

More information

Virtualization, Xen and Denali

Virtualization, Xen and Denali Virtualization, Xen and Denali Susmit Shannigrahi November 9, 2011 Susmit Shannigrahi () Virtualization, Xen and Denali November 9, 2011 1 / 70 Introduction Virtualization is the technology to allow two

More information

SR-IOV Networking in Xen: Architecture, Design and Implementation

SR-IOV Networking in Xen: Architecture, Design and Implementation SR-IOV Networking in Xen: Architecture, Design and Implementation Yaozu Dong, Zhao Yu and Greg Rose Abstract. SR-IOV capable network devices offer the benefits of direct I/O throughput and reduced CPU

More information

Overview of Honeypot Security System for E-Banking

Overview of Honeypot Security System for E-Banking Prajakta Shirbhate, Vaishnavi Dhamankar, Aarti Kshirsagar, Purva Deshpande & Smita Kapse Department of Computer Technology, YCCE, Nagpur, Maharashtra, India E-mail : prajakta.2888@gmail.com, vaishnavi.dhamankar@gmail.com,

More information

Live Virtual Machine Migration with Efficient Working Set Prediction

Live Virtual Machine Migration with Efficient Working Set Prediction 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore Live Virtual Machine Migration with Efficient Working Set Prediction Ei Phyu Zaw

More information

HYBRID HONEYPOT -SYSTEM FOR PRESERVING PRIVACY IN NETWORKS

HYBRID HONEYPOT -SYSTEM FOR PRESERVING PRIVACY IN NETWORKS HYBRID HONEYPOT -SYSTEM FOR PRESERVING PRIVACY IN NETWORKS K.SURESH, KUSH KUMAR YADAV, R.SRIJIT, KARTHIK.P.BHAT STUDENT 3 rd YEAR - INFORMATION TECHNOLOGY SRI SAIRAM ENGINEERING COLLEGE, WEST TAMBARAM,

More information

Attackers Process. Compromise the Root of the Domain Network: Active Directory

Attackers Process. Compromise the Root of the Domain Network: Active Directory Attackers Process Compromise the Root of the Domain Network: Active Directory BACKDOORS STEAL CREDENTIALS MOVE LATERALLY MAINTAIN PRESENCE PREVENTION SOLUTIONS INITIAL RECON INITIAL COMPROMISE ESTABLISH

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking

More information

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Ms. Priyanka Paliwal M. Tech. Student 2 nd yr.(comp. Science& Eng.) Government Engineering College Ajmer Ajmer, India (Erpriyanka_paliwal06@rediffmail.com)

More information

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management CompTIA Security+ Lecture Six Threats and Vulnerabilities Vulnerability Management Copyright 2011 - VTC Malware Malicious code refers to software threats to network and systems, including viruses, Trojan

More information

Honeypots: How do you know when you are inside one?

Honeypots: How do you know when you are inside one? Honeypots: How do you know when you are inside one? Simon Innes & Craig Valli Edith Cowan University sinnes@student.ecu.edu.au c.valli@ecu.edu.au Abstract This paper will discuss honeypots and their use

More information

The only open-source type-1 hypervisor

The only open-source type-1 hypervisor Monika Danikáková What is Xen? The only open-source type-1 hypervisor For Unix and Unix-like OS Linux, NetBSD and OpenSolaris From ancient greek term Xenos (ξένος), guest-friends Developed by the University

More information

Cloud Security (WS 2015/16)

Cloud Security (WS 2015/16) Cloud Security (WS 2015/16) 8. OpenNebula, Intrusion Detection, Honeypots Hans P. Reiser Winter semester 2015/2016, 2015-12-03 Hans P. Reiser Vervielfältigung nur mit Genehmigung Overview: today s class

More information

Honeynets. Chris Brenton Dartmouth College Institute for Security Technology Studies (ISTS) ABSTRACT

Honeynets. Chris Brenton Dartmouth College Institute for Security Technology Studies (ISTS) ABSTRACT header for SPIE use Honeynets Chris Brenton Dartmouth College Institute for Security Technology Studies (ISTS) ABSTRACT Over the last year, network-based intrusions have increased exponentially, due to

More information

Honeynet/pot : the data capture possibilities

Honeynet/pot : the data capture possibilities from data capture to black-hole network December 12, 2013 Definition Where is data capture in the honeynet technology? Data Control The way to contain/limit the attackers. This is the really important

More information

Improving the Effectiveness of Deceptive Honeynets through an Empirical Learning Approach

Improving the Effectiveness of Deceptive Honeynets through an Empirical Learning Approach Improving the Effectiveness of Deceptive Honeynets through an Empirical Learning Approach Nirbhay Gupta School of Computer and Information Science Edith Cowan University, Australia E-mail: nirbhaygupta@yahoo.com

More information

Using Honeypots for Security Operations

Using Honeypots for Security Operations Using Honeypots for Security Operations Jim Barlow Head of Security Operations and Incident Response National Center for Supercomputing Applications (NCSA) University of Illinois

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 9 Performing Vulnerability Assessments

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 9 Performing Vulnerability Assessments Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments Objectives Define risk and risk management Describe the components of risk management List

More information

Implementation and Analysis of Large Receive Offload in a Virtualized System

Implementation and Analysis of Large Receive Offload in a Virtualized System Implementation and Analysis of Large Receive Offload in a Virtualized System Takayuki Hatori and Hitoshi Oi The University of Aizu, Aizu Wakamatsu, JAPAN {s1110173,hitoshi}@u-aizu.ac.jp Abstract System

More information

Virtual Machine Security

Virtual Machine Security Virtual Machine Security CSE443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ 1 Operating System Quandary Q: What is the primary goal

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

ETHICAL HACKING & COMPUTER FORENSIC SECURITY ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,

More information

Chapter 7 Forensic Duplication

Chapter 7 Forensic Duplication Chapter 7 Forensic Duplication Ed Crowley Spring 11 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool

More information

A Study on Linux. Forensics By: Gustavo Amarchand, Keanu. Munn, and Samantha Renicker 11/1/2018

A Study on Linux. Forensics By: Gustavo Amarchand, Keanu. Munn, and Samantha Renicker 11/1/2018 A Study on Linux 11/1/2018 Forensics By: Gustavo Amarchand, Keanu Munn, and Samantha Renicker Abstract In the field of computer forensics investigators must be familiar with many different systems and

More information

Investigating the Implications of Virtual Machine Introspection for Digital Forensics

Investigating the Implications of Virtual Machine Introspection for Digital Forensics 2009 International Conference on Availability, Reliability and Security Investigating the Implications of Virtual Machine Introspection for Digital Forensics Kara Nance and Brian Hay Department of Computer

More information

Defeating Honeypots: Network Issues, Part 1 by Laurent Oudot and Thorsten Holz last updated September 28, 2004

Defeating Honeypots: Network Issues, Part 1 by Laurent Oudot and Thorsten Holz last updated September 28, 2004 Defeating Honeypots: Network Issues, Part 1 by Laurent Oudot and Thorsten Holz last updated September 28, 2004 0. Abstract To delude attackers and improve security within large computer networks, security

More information

Is Virtualization Killing SSI Research? Jérôme Gallard Kerrighed Summit Paris February 2008

Is Virtualization Killing SSI Research? Jérôme Gallard Kerrighed Summit Paris February 2008 Is Virtualization Killing SSI Research? Jérôme Gallard Kerrighed Summit Paris February 2008 Supervisor : Co supervisor: Christine Morin Adrien Lèbre Outline Context Virtualization / SSI Combining Virtualization

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

Modern Buffer Overflow Prevention Techniques: How they work and why they don t

Modern Buffer Overflow Prevention Techniques: How they work and why they don t Modern Buffer Overflow Prevention Techniques: How they work and why they don t Russ Osborn CS182 JT 4/13/2006 1 In the past 10 years, computer viruses have been a growing problem. In 1995, there were approximately

More information

Lecture 7. Xen and the Art of Virtualization. Paul Braham, Boris Dragovic, Keir Fraser et al. 16 November, Advanced Operating Systems

Lecture 7. Xen and the Art of Virtualization. Paul Braham, Boris Dragovic, Keir Fraser et al. 16 November, Advanced Operating Systems Lecture 7 Xen and the Art of Virtualization Paul Braham, Boris Dragovic, Keir Fraser et al. Advanced Operating Systems 16 November, 2011 SOA/OS Lecture 7, Xen 1/38 Contents Virtualization Xen Memory CPU

More information

Supporting Isolation for Fault and Power Management with Fully Virtualized Memory Systems

Supporting Isolation for Fault and Power Management with Fully Virtualized Memory Systems Supporting Isolation for Fault and Power Management with Fully Virtualized Memory Systems Freeman Rawson January 3, 2004 Abstract Fully virtualized systems offer significant commercial advantages in certain

More information

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat WHITE PAPER Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat Executive Summary Unfortunately, it s a foregone conclusion that no organisation is 100 percent safe

More information

Xen is not just paravirtualization

Xen is not just paravirtualization Xen is not just paravirtualization Dongli Zhang Oracle Asia Research and Development Centers (Beijing) dongli.zhang@oracle.com December 16, 2016 Dongli Zhang (Oracle) Xen is not just paravirtualization

More information

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012 Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article

More information

Confinement. Steven M. Bellovin November 1,

Confinement. Steven M. Bellovin November 1, Confinement Steven M. Bellovin November 1, 2016 1 Security Architecture We ve been looking at how particular applications are secured We need to secure not just a few particular applications, but many

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Computer Security Policy

Computer Security Policy Administration and Policy: Computer usage policy B 0.2/3 All systems Computer and Rules for users of the ECMWF computer systems May 1995 Table of Contents 1. The requirement for computer security... 1

More information

MODELING OF CPU USAGE FOR VIRTUALIZED APPLICATION

MODELING OF CPU USAGE FOR VIRTUALIZED APPLICATION e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 644-651 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com MODELING OF CPU USAGE FOR VIRTUALIZED APPLICATION Lochan.B 1, Divyashree B A 2 1

More information

Internal Audit Report DATA CENTER LOGICAL SECURITY

Internal Audit Report DATA CENTER LOGICAL SECURITY Internal Audit Report DATA CENTER LOGICAL SECURITY Report No. SC 12 06 June 2012 David Lane Principal IT Auditor Jim Dougherty Principal Auditor Approved Barry Long, Director Internal Audit & Advisory

More information

Virtualization. Part 1 Concepts & XEN

Virtualization. Part 1 Concepts & XEN Part 1 Concepts & XEN Concepts References and Sources James Smith, Ravi Nair, The Architectures of Virtual Machines, IEEE Computer, May 2005, pp. 32-38. Mendel Rosenblum, Tal Garfinkel, Virtual Machine

More information

Computer Network Vulnerabilities

Computer Network Vulnerabilities Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Xen and the Art of Virtualization. Nikola Gvozdiev Georgian Mihaila

Xen and the Art of Virtualization. Nikola Gvozdiev Georgian Mihaila Xen and the Art of Virtualization Nikola Gvozdiev Georgian Mihaila Outline Xen and the Art of Virtualization Ian Pratt et al. I. The Art of Virtualization II. Xen, goals and design III. Xen evaluation

More information

VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss

VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss Masaya Sato and Toshihiro Yamauchi Graduate School of Natural Science and Technology, Okayama University, 3-1-1 Tsushima-naka,

More information

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition Chapter 3 Investigating Web Attacks Objectives After completing this chapter, you should be able to: Recognize the indications

More information

Design your network to aid forensics investigation

Design your network to aid forensics investigation 18th Annual FIRST Conference Design your network to aid forensics investigation Robert B. Sisk, PhD, CISSP Senior Technical Staff Member IBM Baltimore, Maryland USA Master Outline Introduction Incident

More information

Introduction to Concurrency (Processes, Threads, Interrupts, etc.)

Introduction to Concurrency (Processes, Threads, Interrupts, etc.) Introduction to Concurrency (Processes, Threads, Interrupts, etc.) CS-3013 Operating Systems Hugh C. Lauer (Slides include materials from Slides include materials from Modern Operating Systems, 3 rd ed.,

More information

Honeynets and Digital Forensics

Honeynets and Digital Forensics DIGITAL FORENSIC RESEARCH CONFERENCE Honeynets and Digital Forensics By Lance Spitzner Presented At The Digital Forensic Research Conference DFRWS 2004 USA Baltimore, MD (Aug 11 th - 13 th ) DFRWS is dedicated

More information

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks Overview Handling Security Incidents Chapter 7 Lecturer: Pei-yih Ting Attacks Security Incidents Handling Security Incidents Incident management Methods and Tools Maintaining Incident Preparedness Standard

More information

Unit 2 : Computer and Operating System Structure

Unit 2 : Computer and Operating System Structure Unit 2 : Computer and Operating System Structure Lesson 1 : Interrupts and I/O Structure 1.1. Learning Objectives On completion of this lesson you will know : what interrupt is the causes of occurring

More information

Security Fundamentals for your Privileged Account Security Deployment

Security Fundamentals for your Privileged Account Security Deployment Security Fundamentals for your Privileged Account Security Deployment February 2016 Copyright 1999-2016 CyberArk Software Ltd. All rights reserved. CAVSEC-PASSF-0216 Compromising privileged accounts is

More information

Authentication System

Authentication System A Biologically Inspired Password Authentication System Dipankar Dasgupta and Sudip Saha Center for Information Assurance University of Memphis Memphis, TN 38152 Outline Motivation Position Authentication

More information

PRACTICAL NETWORK DEFENSE VERSION 1

PRACTICAL NETWORK DEFENSE VERSION 1 PRACTICAL NETWORK DEFENSE VERSION 1 The world s premiere online practical network defense course elearnsecurity has been chosen by students in over 140 countries in the world and by leading organizations

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Prof. Margaret Martonosi Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall11/cos318/ Announcements Project

More information

CIT 380: Securing Computer Systems

CIT 380: Securing Computer Systems CIT 380: Securing Computer Systems Incident Response and Honeypots CIT 380: Securing Computer Systems Slide #1 Incident Response What is an Incident? Phases of Incident Response 1. Preparation 2. Identification

More information

CSE543 - Computer and Network Security Module: Virtualization

CSE543 - Computer and Network Security Module: Virtualization CSE543 - Computer and Network Security Module: Virtualization Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 Operating System Quandary Q: What is the primary goal of system

More information

OS Virtualization. Why Virtualize? Introduction. Virtualization Basics 12/10/2012. Motivation. Types of Virtualization.

OS Virtualization. Why Virtualize? Introduction. Virtualization Basics 12/10/2012. Motivation. Types of Virtualization. Virtualization Basics Motivation OS Virtualization CSC 456 Final Presentation Brandon D. Shroyer Types of Virtualization Process virtualization (Java) System virtualization (classic, hosted) Emulation

More information

Optimizing and Enhancing VM for the Cloud Computing Era. 20 November 2009 Jun Nakajima, Sheng Yang, and Eddie Dong

Optimizing and Enhancing VM for the Cloud Computing Era. 20 November 2009 Jun Nakajima, Sheng Yang, and Eddie Dong Optimizing and Enhancing VM for the Cloud Computing Era 20 November 2009 Jun Nakajima, Sheng Yang, and Eddie Dong Implications of Cloud Computing to Virtualization More computation and data processing

More information

intelop Stealth IPS false Positive

intelop Stealth IPS false Positive There is a wide variety of network traffic. Servers can be using different operating systems, an FTP server application used in the demilitarized zone (DMZ) can be different from the one used in the corporate

More information

CNIT 121: Computer Forensics. 9 Network Evidence

CNIT 121: Computer Forensics. 9 Network Evidence CNIT 121: Computer Forensics 9 Network Evidence The Case for Network Monitoring Types of Network Monitoring Types of Network Monitoring Event-based alerts Snort, Suricata, SourceFire, RSA NetWitness Require

More information

Botnet Detection Using Honeypots. Kalaitzidakis Vasileios

Botnet Detection Using Honeypots. Kalaitzidakis Vasileios Botnet Detection Using Honeypots Kalaitzidakis Vasileios Athens, June 2009 What Is Botnet A Botnet is a large number of compromised computers, controlled by one or more Command-and-Control Servers, the

More information

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection Zero Trust on the Endpoint Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection March 2015 Executive Summary The Forrester Zero Trust Model (Zero Trust) of information

More information

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic Chapter Objectives n Understand how to use appropriate software tools to assess the security posture of an organization Chapter #7: Technologies and Tools n Given a scenario, analyze and interpret output

More information

An active intrusion-confronting system using fake session and honeypot

An active intrusion-confronting system using fake session and honeypot An active intrusion-confronting system using fake session and honeypot Myung-Sub Lee, Chang-Hyeon Park Department of Computer Engineering Yeungnam University, #214-1, Dae-dong, Kyungsan, Kyungbuk, 712-749,

More information

VIRTUALIZATION: IBM VM/370 AND XEN

VIRTUALIZATION: IBM VM/370 AND XEN 1 VIRTUALIZATION: IBM VM/370 AND XEN CS6410 Hakim Weatherspoon IBM VM/370 Robert Jay Creasy (1939-2005) Project leader of the first full virtualization hypervisor: IBM CP-40, a core component in the VM

More information

VIRTUAL MEMORY AND VIRTUAL OPERATING SYSTEMS

VIRTUAL MEMORY AND VIRTUAL OPERATING SYSTEMS VIRTUAL MEMORY AND VIRTUAL OPERATING SYSTEMS Course Code: Course Description: CSCI-620 OPERATING SYSTEMS SECURITY : Session: 1 Lecture Unit: CSN1 Topic: Windows virtual memory management Author: Prof.

More information

CSR Computer Policy Statement

CSR Computer Policy Statement CSR Computer Policy Statement This is required reading for everyone with a CSR computer account. General Guidelines As an employee of the Center for Space Research, you are entitled to a computer account

More information

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Section 1: Command Line Tools Skill 1: Employ commands using command line interface 1.1 Use command line commands to gain situational

More information

Intrusion Detection. Comp Sci 3600 Security. Introduction. Analysis. Host-based. Network-based. Distributed or hybrid. ID data standards.

Intrusion Detection. Comp Sci 3600 Security. Introduction. Analysis. Host-based. Network-based. Distributed or hybrid. ID data standards. or Detection Comp Sci 3600 Security Outline or 1 2 3 4 5 or 6 7 8 Classes of or Individuals or members of an organized crime group with a goal of financial reward Their activities may include: Identity

More information