期刊文献+

基于进程生命周期的虚拟机隐藏进程检测技术

Hidden process detection technology in virtual machine based on process life-cycle
下载PDF
导出
摘要 为了解决目前虚拟机隐藏进程检测方案高能耗、检测不全的问题,提出一种基于进程生命周期的隐藏进程检测系统(HPro Dectector)。首先利用虚拟机监视器(VMM)的高特权级和系统自身的回调机制在虚拟机非换页内存区构建一份透明内存区并注入回调函数硬编码,通过回调函数注册模块对进程创建、终止过程注册回调。虚拟机内部进程的创建/终止事件会触发回调函数执行,利用硬件虚拟化的超级调用机制下发目标进程相关信息至事件处理模块,维护真实进程视图。视图分析模块结合真实视图和当前视图进行交叉分析,获取当前隐藏的进程信息。利用多种样本对系统进行实验CART:HPro Dectector在检测功能上优于传统基于线程调度和基于遍历进程链表方案。实验结果表明HPro Dectector可以准确地分析出当前隐藏进程,且具有更低的性能损耗。 To slove the problems of high energy consumption and uncomplete detection of the current hidden process detection schemes,a hidden process detection system based on process life cycle called HPro Dectector was proposed. Using the high privilege of VMM and callback mechanism of guest OS, a block of Transparent Memory( TM) belonging to VM was reserved and hard code of callback was injected to TM, callback function was registerd by callback-registering module in VM and triggered by process creation or termination events. At that time, target process information was sent down to eventprocessing module by using of hardware-assisted virtualization technology and a true process list was maintained constantly.Hidden process list was got from view-analying module by comparing true process list and current process list. Mutiple kinds of samples were chosen to test HPro Dectector function, and the results show that HPro Dectector performs better than traditional schemes which can detect hidden process more accurately with less performance loss.
出处 《计算机应用》 CSCD 北大核心 2017年第A02期39-43,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61272447)
关键词 进程 回调函数 虚拟机监视器 进程视图 生命周期 process callback function Virtual Machine Manager (VMM) process view life cycle
  • 相关文献

参考文献11

二级参考文献233

  • 1李伟,苏璞睿.基于内核驱动的恶意代码动态检测技术[J].中国科学院研究生院学报,2010,27(5):695-703. 被引量:9
  • 2陈林,刘波,胡华平,肖枫涛,张静.Detecting Hidden Malware Method Based on "In-VM" Model[J].China Communications,2011,8(4):99-108. 被引量:2
  • 3林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 4樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 5张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34. 被引量:7
  • 6Thimbleby H,Anderson S,Cairns P.A Framework for Modeling Trojans and Computer Virus Infections.The Computer Journal,1998,41(7):444~458 被引量:1
  • 7Buteler J R Ⅱ.Detecting Compromises of Core Subsystems and Kernel Functions in Windows NT/2000/XP:M.S.Thesis,University of Maryland,Baltimore County,2002 被引量:1
  • 8Butler J,Jeffrey L.Undercoffer and John Pinkston.Hidden Processes:The Implication for Intrusion Detection.In:Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy,West Point,NY,June 2003 被引量:1
  • 9Levine J G,Grizzard J B,Hutto P W,Owen H L.A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call Table.In:Proceedings of IEEE.SoutheastCon,IEEE,2004.25~31 被引量:1
  • 10Levine J,Grizzard J,Owen H.A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.In:Second IEEE International Information Assurance Workshop,2004 被引量:1

共引文献365

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部