Analysis of the Malware Attacks Effects on Virtual Machines
Downloads
Internet becomes a dangerous network due to the growing number of cyber-attacks with malware. In these conditions it is presented the idea of using a virtual machine to secure the data and the services provided on the Internet. In this paper it is assumed the perspective of an attacker to create a model to attack the virtual environment with malware. It will be shown that if somebody will gain the full control over a virtual machine, it will not be able to affect the real machine resources.
Downloads
Qian Huang, An Introduction to Virtual Machines Implementation and Applications, The University of British Columbia, 2006, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.186.4512&rep=rep1&type=pdf.
Barham P., Dragovic B., Fraser K., Hand S., Harris T, Neugebauer R and Warfield A. “Xenand the Art of Virtualization”, 19th ACM Symposium on Operating Systems Principles – SOSP 2003.
Bernasch, M., Grabrielli E. and Mancin, L., “REMUS: A Security-Enhanced Operating System”,ACM Transactions on Information and System Security, Vol 5, 2006.
Chen P. and Noble, B., “When Virtual Is Better Than Real”, Proceedings of the Workshop on Hot Topics in Operating Systems (HotOS), 2005.
Dunlap G., King S., Cinar S., Basrai M. and Chen P., “ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay”, Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), 2013.
Garfinkel, T. and Rosenblum, M., “A Virtual Machine Introspection Based Architecture for Intrusion Detection”, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2010.
Miller, R., “Architecture of Virtual Machines”, 2013.
Jonathan Trull, Easily create securely configured virtual machines, 2017.




