Proceedings of the 1st ACM/USENIX International Conference on Virtual Execution Environments 2005
DOI: 10.1145/1064979.1065006
|View full text |Cite
|
Sign up to set email alerts
|

HyperSpector

Abstract: In this paper, a virtual distributed monitoring environment called HyperSpector is described that achieves secure intrusion detection in distributed computer systems. While multiple intrusion detection systems (IDSes) can protect a distributed system from attackers, they can increase the number of insecure points in the protected system. HyperSpector overcomes this problem without any additional hardware by using virtualization to isolate each IDS from the servers it monitors. The IDSes are located in a virtua… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 70 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Through VMI, a system developed to detect and prevent attacks is capable of observing the protected target from an external perspective that is protected against attacks through the extra isolation provided by VM abstraction. Intrusion Detection Systems (IDS) [159] based on VMI (VMI-IDS) were proposed by researchers [63,80,93,95,186] as a more robust solution for monitoring systems in opposition to previously proposed network-based or host-based IDSs [160]. Also, VMs were used [62] as enablers for Trusted Computing [69,157].…”
Section: Hypervisor-based Defensesmentioning
confidence: 99%
“…Through VMI, a system developed to detect and prevent attacks is capable of observing the protected target from an external perspective that is protected against attacks through the extra isolation provided by VM abstraction. Intrusion Detection Systems (IDS) [159] based on VMI (VMI-IDS) were proposed by researchers [63,80,93,95,186] as a more robust solution for monitoring systems in opposition to previously proposed network-based or host-based IDSs [160]. Also, VMs were used [62] as enablers for Trusted Computing [69,157].…”
Section: Hypervisor-based Defensesmentioning
confidence: 99%