Skip to main content

Dynamic Security Monitoring and Accounting for Virtualized Environments

  • Conference paper
Secure and Trust Computing, Data Management, and Applications (STA 2011)

Abstract

In this paper we present the design of an architecture for dynamic security monitoring and enforcement, based on software protection scheme, for client software running in Virtualized Environments. Monitoring mechanisms check a set of policy-defined conditions at runtime to detect threats or anomalous behaviour. Enforcement will be achieved using secure software execution methods that comply with the policies defined. The architecture presented allows for context adaptation of the policies defined using the language defined in PASSIVE. The automatic runtime enforcement of these policies is crucial to achieve real security in virtualized platforms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Steinberg, U., Kauer, B.: NOVA: a microhypervisor-based secure virtualization architecture. In: Proceedings of the 5th European Conference on Computer systems (EuroSys 2010), pp. 209–222. ACM, New York (2010)

    Google Scholar 

  2. Chowdhury, A., Meyers, S.: Facilitating Software Maintenance by Automated Detection of Constraint Violations, Tech. Rep. CS-93-37 Brown Univ. (1993)

    Google Scholar 

  3. Sellink, A., Verhoef, C.: An Architecture for Automated Software Maintenance. In: Proceedings of the 7th Intl. Workshop on Program Comprehension (1999)

    Google Scholar 

  4. Verhoef, C.: Towards automated modification of legacy assets. Annals of Software Engineering 9(1-4), 315–336 (2000)

    Article  Google Scholar 

  5. van den Brand, M.G.J., Sellink, M.P.A., Verhoef, C.: Control flow normalization for COBOL/CICS legacy system. In: Proceedings of the 2nd Euromicro Conf. on Maintenance and Reengineering

    Google Scholar 

  6. Corritore, L., et al.: On-line trust: concepts, evolving themes, a model. Int. J. of Human-Computer Studies 58(6), 737–758 (2003)

    Article  Google Scholar 

  7. Jøsang, A.: Trust and Reputation Systems. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol. 4677, pp. 209–245. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report MISRC Working Paper Series 96-04, University of Minnesota (1996)

    Google Scholar 

  9. Resnick, P., et al.: Reputation systems. Communications of the ACM 43(12), 45–48 (2000)

    Article  Google Scholar 

  10. Spanoudakis, G.: Dynamic Trust Assessment of Software Services. In: Proc. of 2nd International Workshop on Service Oriented Software Engineering, IW-SOSE 2007 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Muñoz, A., Harjani, R., Maña, A., Díaz, R. (2011). Dynamic Security Monitoring and Accounting for Virtualized Environments. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22365-5_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22364-8

  • Online ISBN: 978-3-642-22365-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics