• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Liu, Weijie (Liu, Weijie.) [1] | Liu, Ximeng (Liu, Ximeng.) [2] | Li, Zhi (Li, Zhi.) [3] | Liu, Bin (Liu, Bin.) [4] | Yu, Rongwei (Yu, Rongwei.) [5] | Wang, Lina (Wang, Lina.) [6]

Indexed by:

EI

Abstract:

Cloud attack provenance is a well-established industrial practice for assuring transparency and accountability for a service provider to tenants. However, the multi-tenancy and self-service nature coupled with the sheer size of a cloud implies many unique challenges to cloud forensics. Although Virtual Machine Introspection (VMI) is a powerful tool for attack provenance due to the privilege isolation, the stealthiness of state-of-the-art attacks and the lack of precise information make existing attack provenance solutions difficult to fulfill real-time forensics when tracking enormous suspicious behaviors. To this end, we propose an instruction-level tracing framework for inspecting the presence of attacks by dynamically tracking shared processor hardware event patterns and analyzing the attack traces. To overcome the challenges of real-time detection and provenance, we advocate Last Branch Record (LBR) profiling, to extract the suspicious execution flows. With the hardware assistance and software-based virtualization introspection, we show that the framework can provide an effective response to threats in different cases, thereby enabling a quick attack provenance with high fidelity. The evaluation shows that our prototype introduces negligible performance penalties. © 2005-2012 IEEE.

Keyword:

Computer forensics Network security Virtual machine

Community:

  • [ 1 ] [Liu, Weijie]Indiana University, Luddy School of Informatics, Computing, and Engineering, Bloomington; IN; 47408, United States
  • [ 2 ] [Liu, Ximeng]Fuzhou University, College of Computer and Data Science, Fuzhou; 350116, China
  • [ 3 ] [Li, Zhi]Huazhong University of Science and Technology, School of Cyber Science and Engineering, Wuhan; 430074, China
  • [ 4 ] [Liu, Bin]Hubei University, School of Computer and Information Engineering, Wuhan; 430062, China
  • [ 5 ] [Yu, Rongwei]Wuhan University, School of Cyber Science and Engineering, Wuhan; 430079, China
  • [ 6 ] [Wang, Lina]Wuhan University, School of Cyber Science and Engineering, Wuhan; 430079, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Information Forensics and Security

ISSN: 1556-6013

Year: 2022

Volume: 17

Page: 2311-2323

6 . 8

JCR@2022

6 . 3 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 6

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:470/11074608
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1