skip to main content
10.1145/1229285.1229313acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

A novel approach for a file-system integrity monitor tool of Xen virtual machine

Published:20 March 2007Publication History

ABSTRACT

File-system integrity tools (FIT) are commonly deployed host-based intrusion detections (HIDS) tool to detect unauthorized file-system changes. While FIT are widely used, this kind of HIDS has many drawbacks: the intrusion detection is not done in real-time manner, which might render the whole scheme useless if the attacker can somehow take over the system with privileged access in the time between. The administrator also has a lot of problems to keep the base-line database updating. Besides, the database and the FIT itself are vulnerable if the attacker gains local privileged access.This paper presents a novel approach to address the outstanding problems of the current FIT. We propose a design and implementation of a tool named XenFIT for Xen virtual machines. XenFIT can monitor and fires alarms on intrusion in real-time manner, and our approach does not require to create and update the database like in the legacy methods. XenFIT works by dynamically patching memory of the protected machine, so it is not necessary to install any kernel code or user-space application into the protected machines. As a result, XenFIT is almost effortless to deploy and maintain. In addition, thanks to the advantage introduced by Xen, the security polices as well as the detection process are put in a secure machine, so XenFIT is tamper-resistant with attack, even in case the attacker takes over the whole VM he is penetrating in. Finally, if deploying strictly, XenFIT is able to function very stealthily to avoid the suspect of the intruder.

References

  1. N. A. Kamble, J. Nakajima, and A. K. Mallick. Evolution in kernel debugging using hardware virtualization with xen. In Proceedings of the 2006 Ottawa Linux Symposium, Ottawa, Canada, July 2006.Google ScholarGoogle Scholar
  2. K. Asrigo, L. Litty, and D. Lie. Virtual machine-based honeypot monitoring. In Proceedings of the 2nd international conference on Virtual Execution Environments, New York, NY, USA, June 2006. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. Atkins. SWATCH: The Simple WATCHer of Logfiles. http://swatch.sourceforge.net/, July 2004.Google ScholarGoogle Scholar
  4. CERT Coordination Center. CERT/CC Overview Incident and Vulnerability Trends. Technical report, Carnegie Mellon Software Engineering Institute, May 2003.Google ScholarGoogle Scholar
  5. CMN. SAdoor: A non listening remote shell and execution server. http://cmn.listprojects.darklab.org/, 2002.Google ScholarGoogle Scholar
  6. B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer. Xen and the art of virtualization. In Proceedings of the ACM Symposium on Operating Systems Principles, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. DWARF Workgroup. DWARF Debugging Format Standard. http://dwarf.freestandards.org/Home.php, January 2006.Google ScholarGoogle Scholar
  8. R. Hock. Dica rootkit. http://packetstormsecurity.nl/UNIX/penetration/rootkits/dica.tgz, 2002.Google ScholarGoogle Scholar
  9. Intersect Alliance. System iNtrusion Analysis and Reporting Environment. http://www.intersectalliance.com/projects/Snare/, January 2005.Google ScholarGoogle Scholar
  10. G. H. Kim and E. H. Spafford. The Design and Implementation of Tripwire: A File System Integrity Checker. In ACM Conference on Computer and Communications Security, pages 18--29, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. T. Miller. Analysis of the Knark rootkit. www.ossec.net/rootkits/studies/knark.txt, 2001.Google ScholarGoogle Scholar
  12. T. Miller. Analysis of the T0rn rootkit. http://www.sans.org/y2k/t0rn.htm, 2002.Google ScholarGoogle Scholar
  13. S. Patil, A. Kashyap, G. Sivathanu, and E. Zadok. I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System. In Proceedings of the 18th USENIX Large Installation System Administration Conference (LISA 2004), pages 69--79, Atlanta, GA, November 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H. Pomeranz. File Integrity Assessment via SSH. http://www.samag.com/documents/s=9950/sam0 602a/0 602a.htm, February 2006.Google ScholarGoogle Scholar
  15. I. Pratt, K. Fraser, S. Hand, C. Limpach, A. Warfield, D. Magenheimer, J. Nakajima, and A. Mallick. Xen 3.0 and the art of virtualization. In Proceedings of the 2005 Ottawa Linux Symposium, Ottawa, Canada, July 2005.Google ScholarGoogle Scholar
  16. sd. Linux on-the-fly kernel patching. http://www.phrack.org/show.php?p=58&a=7, July 2002.Google ScholarGoogle Scholar
  17. SGI Inc. LKCD - Linux Kernel Crash Dump. http://lked.sf.net, April 2006.Google ScholarGoogle Scholar
  18. L. Somer. Linux Rootkit 5. http://packetstormsecurity.nl/UNIX/penetration/rootkits/lrk5.src.tar.gz, 2000.Google ScholarGoogle Scholar
  19. The AIDE team. AIDE: Advanced Intrusion Detection Environment. http://sourceforge.net/projects/aide, November 2005.Google ScholarGoogle Scholar
  20. The Osiris team. Osiris host integrity monitoring. http://www.hostintegrity.com/osiris/, September 2005.Google ScholarGoogle Scholar
  21. The Samhain Labs. Samhain manual. http://la-samhna.de/samhain/manual/index.html, 2004.Google ScholarGoogle Scholar
  22. The Samhain Labs. The SAMHAIN file integrity/intrusion detection system. http://la-samhna.de/samhain/, January 2006.Google ScholarGoogle Scholar
  23. The Snort team. Snort - the de-facto standard for intrusion detection/prevention. http://www.snort.org, January 2006.Google ScholarGoogle Scholar
  24. Xen project. Xen interface manual. http://www.cl.cam.ac.uk/Research/SRG/netos/xen/readmes/interface/interface.html, August 2006.Google ScholarGoogle Scholar

Index Terms

  1. A novel approach for a file-system integrity monitor tool of Xen virtual machine

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security
        March 2007
        323 pages
        ISBN:1595935746
        DOI:10.1145/1229285

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 March 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        ASIACCS '07 Paper Acceptance Rate33of180submissions,18%Overall Acceptance Rate418of2,322submissions,18%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader