Using VMM-based sensors to monitor honeypots

  • Authors:
  • Kurniadi Asrigo;Lionel Litty;David Lie

  • Affiliations:
  • University of Toronto;University of Toronto;University of Toronto

  • Venue:
  • Proceedings of the 2nd international conference on Virtual execution environments
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system for collecting information about attacks on honeypots. We document and evaluate three designs we have implemented on two open-source virtualization platforms: User-Mode Linux and Xen. Our results show that our designs give the monitor good visibility into the system and thus, a small number of monitoring sensors can detect a large number of intrusions. In a three month period, we were able to detect five different attacks, as well as collect and try 46 more exploits on our honeypots. All attacks were detected with only two monitoring sensors. We found that the performance overhead for monitoring such intrusions is independent of which events are being monitored, but depends entirely on the number of monitoring events and the underlying monitoring implementation. The performance overhead can be significantly improved by implementing the monitor directly in the privileged code of the VMM, though at the cost of increasing the size of the trusted computing base of the system.