Honeypotting with Solaris

Size: px
Start display at page:

Download "Honeypotting with Solaris"

Transcription

1 Honeypotting with Solaris Sakari Laitinen Helsinki University of Technology Abstract Attack is the best defence, it is said. This paper is about honeypots, which are good counter-measure to detect intrusions and abnormal activity in the Internet of these days. Since security in honeypots is a big concern, this paper is about Solaris 10 operating oystem, which claims to be the most secure OS in the world. This paper focuses on figuring out how Solaris 10 works when used to deploy a virtual honeynet. Solaris has very good features for server consolidation, which allows multiple workloads to run on the same system, has become very important way to improve the utilization and reduce costs in the increasingly growing data center needs. This paper introduces technologies that Solaris 10 provides for virtualization and system observation. These technologies are mainly designed to provide solutions for server consolidation projects and to find serious systemic performance problems on production systems. KEYWORDS: Honeypot, Honeynet, Solaris, Zones, Virtualization 1 Introduction Nowadays information security is increasingly growing concern. More and more stories are heard about threats from the Internet. Sometimes when computer system gets compromised, it is often quite a surprise. The attackers try to hide their tracks and leave the system looking like untouched, so usually the amount of analyzable data what is left behind is pretty small. These occasions do not teach very much. Who would be better example of the threats, that against the computer systems should be defended, than the attacker himself? The problem is, how to know when the attacker hits? While attackers are developing new method, it is not a reason for organizations to stand still and wait for an attack. Something have to be done to detect the malicious activity. This is where the honeypots step into the picture. Honeypots are decoy systems which are supposed to be attacked, and that information from the attack should be used as an advantage for organizations. Earlier work in this area has been done mostly about using User-Mode Linux as a honeypot. There has also been problems on many areas, such as the detectability of honeypot. This is very understandable thing, because there are no operating systems that would have been designed to honeypot usage. Before that happens, have to use the tools that are already available. Solaris 10 Operating System claims to be the most secure OS on the planet[16] and it includes good tools for virtualization and system observation built-in. Because the tools are already there, the implementation of virtual honeynet should be easy. But actually it is not. Usually software applications and operating systems provide as much information as possible or at least when the user requests for it. Therefore, it is hard to find ready-made solution which could work well and would not expose itself to the malicious attacker. The rest of this paper is structured as follows. Section 2 provides an introduction to honeypots and different honeynet types. Section 3 introduces what kind of virtualization technologies and system observation facilities exists in Solaris. Section 4 presents an example of honeynet deployment with Solaris and discusses the challenges, problems and some possible solutions what could be done to make the honeypot more undetectable. Summary and conclusions are given in section 5. 2 Background The Honeynet Project is an organization which has researched honeypots and honeynets since The project is answering to the question when the hit happens. The method is to setup tempting looking system and wait for the attack. Like a jar of honey waiting for some eager bear to eat, therefore the name honeypot. There is no strict definition what a honeypot system is. Honeypot can do everything from intrusion detection to measuring security threats organizations face. The Honeynet Project founder Lance Spitzner describes honeypots with the sentence: A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource[17]. 2.1 Honeypots Generally honeypot is a isolated and monitored computer system, which has not any production value. Because there are no normal interaction with the honeypot, any activity and network traffic is most likely illicit or unauthorized. From normal computer system is much harder to find the malicious traffic. It takes time to filter out the normal traffic and figure out the false positives from intrusion detection systems. Besides the smaller amount of logged data, it is usually easier to setup monitoring and intrusion detection systems to empty servers that do not have some business critical services running. Also the honeypots are often very easy to replace if the system gets compromised. Usually collecting the useful data to researches, copying a fresh disk image to the host and then the honeypot is back in business.

2 Honeypots are used for production purposes or research[11]. The ones used for production purposes are usually preventing and detecting attacks to real systems. The research honeypots only collect information for studying attackers. Usually honeypots are used for production purposes as intrusion detection systems, because it is enough to know about the ongoing malicious activity and protect the real systems from attackers. Research honeypots have no other purpose than to be attacked and hopefully get compromised to create as much interesting information as possible. Problem with the security threats are, that usually the attackers are one step ahead finding new attacking methods and security gaps. Research honeypots try to reveal these and maybe even find out who the attacker is. The Honeynet Project non-profit organizationg specialized in reseaching honeypots and collecting data around the world. The basic honeypot implementation types can be divided to two category, low-interaction and high-interaction honeypots Low-interaction honeypots Low-interaction honeypots usually emulate services or operating systems. The dummy services normally give some real-looking answer to connection attempts, but nothing else. For example, fake telnet daemon can ask for a combination of login name and password, and then close the connection. There is no real server to compromise, but the data of the login attempts and connection sources are still the same. Low-interaction honeypots are easier to maintain, because the risk of really get compromised is smaller. Several implementations of these emulated services exists, such as Honeyd. Honeyd is a low-interaction honeypot which has lots of features to emulate different services and operating systems[10] High-interaction honeypots High-interaction honeypots usually involve real computers, applications and operating systems. These honeypots have much higher risk to be used as further malicious activites, such as zombie hosts in distributed denial of service attacks. These honeypots need much more attention and deployment needs more configuration, because the applications are real. Also the possibility for further attacks from the honeypot host have to be blocked. Even though high-interaction honeypots need more effort, there are also some benefits. The responses to attack attempts are real and the possibility to get some research data from the attacking methods, motives and possible security holes in the server software are revealed. Generally high-interaction honeypots can give much more information than low-interaction honeypots. Usually low-interaction honeypot can imitate many servers, but the services in high-interaction honeypots are divided to many servers, forming a honeynet. 2.2 Honeynets Honeynet should be an environment where the tools and the attacked systems would be kept isolated from everything else. Honeynets have some requirements that would be good thing to fulfill. Honeynets should be able to control the inbound and outbound traffic. There should not be known network activity inside the honeynet, so every unknown incoming connection is malicious. Also outbound traffic must be able to restrict because of possible compromisation. Honeynets should be able to capture and log the activity inside the honeynet without exposing it to the attackers and also be able to transfer the collected data to some secure place waiting for analyzement[12] Honeynet architecture Implemented honeynets often have transparent bridging firewall working as gateway to the honeynet and doing data control by firewalling. The data capture is done in the gatewayfirewall, honeywall and of course in the different honeypot hosts. Data collection from the different hosts might be difficult to do secretly. There are some tools for that purpose, such as hidden kernel modules which can log the user activity in the honeypot and transmit the data secretly to some data collector. One example is Sebek[14], which has hidden kernel module client that captures data from the attackers actions and sends it to the collecting Sebek server Virtual honeynets Virtual honeynets are very similar as normal honeynets. Only difference is that the whole honeynet deployment has been done by virtualizing the honeypot hosts on single computer. Virtualization removes the need to have separate computers filling data center, but it also changes some things. The deployment might be easier, if it is possible just clone the virtual machine several times and then do the needed configurations. The virtualization can also bring some problems, depending on the implementation. For example, some disadvantages are that the virtual machine can be easier to detect as honeypot than normal server, because the virtualization is not always so well hidden, but even the normal server can have some revealing kernel modules or software. Also the host machine will become a single point of failure, if something breaks up, the whole honeynet goes down. One possibility is to make a hybrid honeynet, which consists of both virtual and physical machines. Virtual machines usually have lack of stealth and it is pretty easy to figure out if you are inside of virtual machine. 3 Solaris The Solaris operating system (Solaris OS) from Sun Microsystems has evolved very much since the release of Solaris 2.0 in With the release of Solaris 10 the evolution process took a quantum leap. Solaris Zones made a big change in OS virtualization. Solaris used to be a commercial and closed-source product, a majority of the codebase has been open-sourced by Sun Microsystems. After the open source announcement some of the new technologies in Solaris 10 has been ported to many other operating systems. For example DTrace, the dynamic tracing facility and ZFS file system has been ported to Mac OS X and FreeBSD.

3 Key areas of Solaris development has been reliability, performance and scalability, manageability, observability and resource management. Solaris has downward binary compatibility guarantee by Sun Microsystems[1]. That has made Solaris always really reliable operating system, because you can be sure that the software from the previous version works after upgrade. For performance and scalability, Solaris have always been well-suited for symmetric multi-processing and the scalability should not be an issue, because the absolutely same Solaris 10 operating system works from the desktop systems to high-end mainframe class servers. 3.1 Virtualization in Solaris The analysts from IDC say that conventional server utilization is between 10-15% range, meaning that even 90% of the capacity is wasted[7]. Goal would be to clean up data centers and increase utilization of equipment. Solaris supports many different technologies to do system consolidation. Some of the technologies need more from the underlying hardware than others. For OS virtualization the Solaris Zones work very well. The Zones work on any server as the normal Solaris installation. Zones are also very flexible, create very little overhead and are quite easy to deploy, so those are often a good solution in server consolidation. Solaris is also capable of doing hypervisor-based virtualization. Logical Domains need support from the hardware to work well and are mainly designed for multicore server utilization. The xvm is not yet in the official Solaris 10 release, but already in OpenSolaris, so it will be coming from there some day. The mostly used techniques are the Solaris Zones and Logical Domains which will be introduced next Solaris Zones Solaris Zones is not a real virtual machine environment, but it could be defined like this: "Zones is a software partitioning technology that enables the creation and management of multiple virtualized operating system execution environments within a single instance of the Solaris kernel[9]." The management and system infrastructure administration, such as physical devices or routing, can be only done from the global which encloses all other s. The global always exists and is comparable to a normal Solaris operating system instance which has all processes, privileges and devices available. The s facility provides an isolated environment, a sandbox or a jail. Processes running in a are prevented from interaction between processes in different s and the physical attributes of the system with abstraction layers. Access to network interfaces, file systems, devices and the privileges available within a are restricted. The virtual platform in Figure 1 is the layer that provides the access to virtual devices for the s, such as virtual network interfaces. Each is assigned a name and numeric id, which will be used in the process isolation. Only processes with the same id number are visible within the. For each active there are two system processes to manage the virtual platform and application environment. admd Figure 1: Zones Server Consolidation Example [19] is system daemon responsible of managing the s virtual platform and resource management. This daemon is also does the setup and teardown of the application environment. The admd starts the other important process, zsched. zsched is kernel process, which mostly keeps track of the per- kernel-threads. The admd is also responsible for tasks including setting up the, initializing devices and mounting file systems. Even though all s share the same Solaris OS instance, each running runs its own set of core services, has its own process environment and their own restricted file systems. Since the privileges and user namespaces are also virtualized, it is possible to safely delegate the administration to user within the. One of the new features of Solaris 10 update 4 was the Branded Zones[3]. Normal installations are native s which use the same Solaris OS as the global. It is also possible to brand to something else and install a different operating environment inside of a non-global. The BrandZ framework extends the Solaris Zones infrastructure to enable non-native s and alternative sets of operating environments. The BrandZ infrastructure would allow wide range of operating environments, but currently Solaris is capable to run Linux and Solaris 8 userlands with the Solaris 10 kernel after installing proper operating environment to the. Solaris 8 Migration assistant helps in server migration from old Solaris 8 to Solaris 10. BrandZ/lx[4], also known as Solaris Containers for Linux Applications enables user-level Linux applications run unmodified on Solaris kernel and even do dynamic tracing to the lx branded with the DTrace, which will be introduced in the section Logical Domains While the Zones is OS virtualization technique in the Fig. 2 [18], there also exists virtual machine possibility to run different operating systems in parallel. To divide one server to multiple separate systems on SPARC architecture there is technology called Logical Domains (LDoms)[8]. LDoms include the hypervisor which is a thin software layer between operating system and hardware. Hypervisor is not itself an

4 DTrace allows for many tens of thousands probe points and also can instrument almost the whole kernel, including subsystems, such as scheduler and synchronization facilities[5]. The actions and predicates in DTrace are described in specific C-like language, namely "D". The scripts in D-language make the tracing easy, because you can use the same scripts over and over again. D-language is rahter versatile script language, even though it does not include syntactic structures, such as loops or branches. For example, it is not hard to write a "hello world" program with the D. #!/usr/sbin/dtrace -qs Figure 2: LDom vs. Zones difference operating system, but it makes the machine hardware virtualized and isolates the operating system from the register level. The hypervisor provides stable virtualized sun4v architecture to the operating system. Logical Domains technology is a partitioning capability to create full virtual machines which each has own identity, independent operating system and dynamically configurable subset of resources. Each logical domain can be installed, configured, rebooted or destroyed independently, without interfering other logical domains. Protection and isolation between the domains is done by using hardware and hypervisor firmware combination xvm On x86 architecture there is xvm, which is port of Xen open source hypervisor to run with OpenSolaris. xvm is the hypervisor layer to enable possibility to run virtualized operating systems. Some of operating systems have not been paravirtualize or those are closed source, so the paravirtualization has been impossible. The goal is to get operating systems work without modification. To make it possible, some new processor features are needed, such as support for hypervisors, some traps for unsafe instructions and better memory access. Full emulation solutions can be found already, such as Bochs[2], but the performance is not so good, because the emulation is done on all instructions through software. 3.2 Dynamic Tracing in Solaris Solaris 10 introduced a new facility for dynamic instrumentation of production systems. This facility is called DTrace[13] and it has been integrated into solaris. DTrace is mainly aimed for system administrators, software developers and operating system developers. DTrace is built on flexible observability framework and is really flexible system to dynamically instrument user-level and kernel-level software. DTrace is integrated into Solaris kernel and is always ready to use without any software restarts or system reboots. When DTrace is not in use, it has no effect for the system performance at all. It is just as it were not present at all. BEGIN { printf("hello World!\n") ; exit(0) ; } Almost as easy task is to use syscall-probe from kernel and trace what system calls the httpd-processes perform in the WWW-. #!/usr/sbin/dtrace -qs syscall:::entry / execname=="httpd" && name=="www" / { printf("pid %d called %s\n", pid, probefunc); } For those, who do not want to reinvent the wheel, there exists such thing as DTraceToolkit[6]. It is a big collection of D-scripts for many purposes. Lots of things can be done with those directly or with a little modifications for own purposes. To be able to run DTrace without restrictions and trace everything, the tracing must be done from the global. For example, it is really easy to use DTrace to snoop inside of a what files the user opens, what syscalls are done or what kind of input shell commands in the specific get and what is the output. It is also rather easy to use DTrace only as a part of your tracing tool. For example, using the DTrace as a data collector for Perl script which processes the data for some suitable format. 4 Deploying a honeynet This section describes the experiment of deploying a small honeynet with Solaris 10. Section 5.1 describes the actual test system that was implemented and Section 5.2 discusses about the experiences, challenges and problems that arise. 4.1 System description The experiment system was basic installation of Solaris 10. With an empty system to start with, it was not hard to continue the honeynet experiment. After creating one and given it basic configuration, it was easy to clone it to couple of more instances. Soon after configuring the services in the different s, the honeynet looked like something. At least

5 4.2 Experiences, challenges and problems HTTP Internet Self contained virtual honeynet Global SMTP FTP SSH NTP Telnet Figure 3: Self Contained Virtual Honeynet building the honeynet was easy. The experimental honeynet in Fig. 3 was self contained virtual honeynet, which had four hosts and some services on them, for example HTTP, FTP, SMTP, NTP, Telnet and SSH servers. Surprisingly, an Ethernet Bridge was missing feature and changed the plans of configure one to work as a transparent network gateway. The data control will be done by using the firewall from the global, so it cannot be noticed or changed from inside the. Snort[15] the intrusion detection system was also installed and configured in the global to listen to the network interfaces. All the internal filesystems of the s can be accessed from the global, so the normal logs from the daemons are easy to acquire without affecting the s. The next procedure was to add some DTrace scripts for monitoring the internal services. In the DTraceToolkit was script shellsnoop, which was almost ready for the usage. It needed only some little modifications to make the script trace the inputs and outputs of shellprocesses from s which are not global. This way it is easy to collect the user activity from the global without affecting the honeypot s. Also similar scripts can be set up to monitor network probes about TCP-connections or any other probe in the system. In the test installation, the listing of probes returned almost usable probes. Because this experiment was mostly just a proof of concept, no further experiments, like monitoring real network traffic, were done. The deployment of the test honeynet was really easy task. Only thing that could not be done this time was a surprise that Solaris does not have the Ethernet Bridge feature, yet. This feature is still under development and it can be found from the OpenSolaris, but not yet from the official Solaris release. So in this it was not possible to make transparent bridge gateway from one. If the attacker manages to access shell account somehow, it is really easy to figure out that he is inside a. Because the userland has the same system tools as the global with the all features, it is really easy to use some commands to check if the s name is global or not, such as name or ps -Z. So Solaris really have this kind of lack of stealth. The extensions for User-Mode Linux were made to fix some of stealth problems in UML, but similar work has not been done for Solaris. 5 Conclusions Solaris has really good tools for system adminstration. The deployment and management of the s is very easy, if compared to installing new server to be each node in the test honeynet. It works very well for running virtualized lowinteraction honeypots, because then the detectability is not problem. It is also good at high-interactive honeypots until the point, where the attacker somehow would gain shell access to the. The current system tools and utilities show too easily hints about being inside some other than the global. If you happen to get shell access, then it is too obvious that you are inside of. The fact is that Solaris was not designed to be undetectable honeypot. But, actually the detectability does not seem to be as a big problem as before. Because the data centers and server rooms include more and more virtualized systems, even though attacker might have noticed being in virtualized system, how does the attacker know, if he got in a real production machine? The trend is that big organizations consolidate their big data centers to more economical solutions, because usually they make big savings in the process. Therefore, it feels like it will be harder to find the non-virtualized system than some virtual machine. References [1] Solaris binary application guarantee program. Available on: solaris/guarantee.jsp. Accessed: 2007, Nov 16. [2] Bochs. Available on: sourceforge.net/. Accessed: 2007, Nov 16. [3] Solaris branded s. Available on: http: // brandz/design/. Accessed: 2007, Nov 16. [4] Solaris containers for linux applications. Available on:

6 community/brandz/brandz_overview.pdf. Accessed: 2007, Nov 16. [5] B. Cantrill, M. W. Shapiro, and A. H. Leventhal. Dynamic instrumentation of production systems. In USENIX Annual Technical Conference, General Track, pages 15 28, [19] Zones server consolidation example. Available on: /6mhahuooa. Accessed: 2007, Nov 16. [6] Dtracetoolkit. Available on: opensolaris.org/os/community/dtrace/ dtracetoolkit/. Accessed: 2007, Nov 4. [7] Idc white paper: Virtualization across the enterprise. Available on: datacenter/consolidation/docs/idc_ SystemVirtualizati%on_Aug2007.pdf. Accessed: 2007, Nov 16. [8] Sun logical domains (ldoms). Available on: coolthreads/ldoms/datasheet.pdf. Accessed: 2007, Nov 16. [9] R. McDougall and J. Mauro. Solaris Internals: Solaris 10 and OpenSolaris Kernel Architecture. Prentice-Hall Inc, 2nd edition, [10] I. Mokube and M. Adams. Honeypots: concepts, approaches, and challenges. In ACM-SE 45: Proceedings of the 45th annual southeast regional conference, pages , New York, NY, USA, ACM. [11] T. H. Project. Know your enemy: Honeynets. Available on: papers/honeynet/, Accessed: 2007, Nov 4. [12] T. H. Project. Know your enemy: Genii honeynets. Available on: org/papers/gen2/, Accessed: 2007, Nov 4. [13] J. M. Richard McDougall and B. Gregg. Solaris Performance and Tools: DTrace and MDB Techniques for Solaris 10 and OpenSolaris. Prentice-Hall Inc, 1st edition, [14] Sebek. Available on: org/tools/sebek/. Accessed: 2007, Nov 16. [15] Snort - network intrusion detection system. Available on: Accessed: 2007, Nov 4. [16] Solaris security features. Available on: security.jsp. Accessed: 2007, Nov 16. [17] L. Spitzner. Honeypots. Available on: spitzner.net/honeypots.html, Accessed: 2007, Nov 4. [18] Virtualization & consolidation : Sun virtualization solutions. Available on: virtualization/. Accessed: 2007, Nov 4.

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

Securing the system using honeypot in cloud computing environment

Securing the system using honeypot in cloud computing environment Volume: 2, Issue: 4, 172-176 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 M. Phil Research Scholar, Department of Computer Science Vivekanandha College

More information

Dynamic Honeypot Construction

Dynamic Honeypot Construction Dynamic Honeypot Construction 2nd Annual Alaska Information Assurance Workshop Christopher Hecker U. of Alaska, Fairbanks 9-5-2006 Presentation l Brief Introduction l Project Overview l Future Work l References

More information

HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region

HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Virtualization Technology

Virtualization Technology Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst mhw@linux.vnet.ibm.com 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the

More information

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment

More information

The Art of Virtualization with Free Software

The Art of Virtualization with Free Software Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike

More information

Virtualization. Jukka K. Nurminen 23.9.2015

Virtualization. Jukka K. Nurminen 23.9.2015 Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,

More information

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1 Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and

More information

Advanced Honeypot System for Analysing Network Security

Advanced Honeypot System for Analysing Network Security ISSN: 2347-3215 Volume 2 Number 4 (April-2014) pp. 65-70 www.ijcrar.com Advanced Honeypot System for Analysing Network Security Suruchi Narote 1* and Sandeep Khanna 2 1 Department of Computer Engineering.

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

Honeypots / honeynets

Honeypots / honeynets Honeypots / honeynets presentatie naam 1 Agenda Honeypots Honeynets Honeywall presentatie naam 2 Traffic Problem: Vast quantities of normal traffic Find suspect bits presentatie naam 3 Honeypot Machine

More information

Catching hackers using a virtual honeynet: A case study

Catching hackers using a virtual honeynet: A case study Catching hackers using a virtual honeynet: A case study D.N. Pasman d.n.pasman@student.utwente.nl ABSTRACT This paper presents an evaluation of honeypots used for gathering information about the methods

More information

A Survey on Virtual Machine Security

A Survey on Virtual Machine Security A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology jreubens@cc.hut.fi Abstract Virtualization plays a major role in helping the organizations to reduce the operational

More information

Banking Security using Honeypot

Banking Security using Honeypot Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai smchaware@gmail.com Abstract New threats are constantly emerging to the security of organization s information

More information

Daniel Meier & Stefan Badertscher

Daniel Meier & Stefan Badertscher Daniel Meier & Stefan Badertscher 1. The definition of Honeypots 2. Types of Honeypots 3. Strength and Weaknesses 4. Honeypots in action 5. Conclusions 6. Questions 7. Discussion A honeypot is an information

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Virtual Private Systems for FreeBSD

Virtual Private Systems for FreeBSD Virtual Private Systems for FreeBSD Klaus P. Ohrhallinger 06. June 2010 Abstract Virtual Private Systems for FreeBSD (VPS) is a novel virtualization implementation which is based on the operating system

More information

Виртуализация приложений: какой из вариантов виртуализации подходит именно вам. Филипп Торчинский Sun Microsystems

Виртуализация приложений: какой из вариантов виртуализации подходит именно вам. Филипп Торчинский Sun Microsystems Виртуализация приложений: какой из вариантов виртуализации подходит именно вам Филипп Торчинский Sun Microsystems 1 1 Oracle + Sun Complete, Integrated Systems Customer Benefits: Standards-based Innovation

More information

The Benefits of Verio Virtual Private Servers (VPS) Verio Virtual Private Server (VPS) CONTENTS

The Benefits of Verio Virtual Private Servers (VPS) Verio Virtual Private Server (VPS) CONTENTS Performance, Verio FreeBSD Virtual Control, Private Server and (VPS) Security: v3 CONTENTS Why outsource hosting?... 1 Some alternative approaches... 2 Linux VPS and FreeBSD VPS overview... 3 Verio VPS

More information

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...

More information

Virtual Machines. www.viplavkambli.com

Virtual Machines. www.viplavkambli.com 1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software

More information

Virtual Hosting & Virtual Machines

Virtual Hosting & Virtual Machines & Virtual Machines Coleman Kane Coleman.Kane@ge.com September 2, 2014 Cyber Defense Overview / Machines 1 / 17 Similar to the network partitioning schemes described previously, there exist a menu of options

More information

Honeypots and Honeynets Technologies

Honeypots and Honeynets Technologies New Mexico State University Honeypots and Honeynets Technologies Hussein Al-Azzawi Final Paper CS 579 Special Topics / Computer Security Nov. 27, 2011 Supervised by Mr. Ivan Strnad Table of contents: 1.

More information

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

DETECTING AND ANALYZING NETWORK ATTACKS USING VIRTUAL HONEYNET NUR ATIQAH BT. HASAN 2003470954

DETECTING AND ANALYZING NETWORK ATTACKS USING VIRTUAL HONEYNET NUR ATIQAH BT. HASAN 2003470954 DETECTING AND ANALYZING NETWORK ATTACKS USING VIRTUAL HONEYNET By NUR ATIQAH BT. HASAN 2003470954 In partial fulfillment of requirement for the BACHELOR OF SCIENCE (Hons.) IN DATA COMMUNICATION AND NETWORKING

More information

Sun TM xvm Hypervisor

Sun TM xvm Hypervisor Sun TM xvm Hypervisor Gary Pennington Solaris Kernel Engineer April 24, 2008 Agenda Hypervisors 101 Introduction to Sun TM xvm Hypervisor Use Cases Using the hypervisor Control domain: booting, services,

More information

Operating System Structures

Operating System Structures COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating

More information

Virtualization in Linux

Virtualization in Linux Virtualization in Linux Kirill Kolyshkin September 1, 2006 Abstract Three main virtualization approaches emulation, paravirtualization, and operating system-level virtualization are covered,

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

Honeypot as the Intruder Detection System

Honeypot as the Intruder Detection System Honeypot as the Intruder Detection System DAVID MALANIK, LUKAS KOURIL Department of Informatics and Artificial Intelligence Faculty of Applied Informatics, Tomas Bata University in Zlin nam. T. G. Masaryka

More information

Implementing Security on virtualized network storage environment

Implementing Security on virtualized network storage environment International Journal of Education and Research Vol. 2 No. 4 April 2014 Implementing Security on virtualized network storage environment Benard O. Osero, David G. Mwathi Chuka University bosero@chuka.ac.ke

More information

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced

More information

Security Advice for Instances in the HP Cloud

Security Advice for Instances in the HP Cloud Security Advice for Instances in the HP Cloud Introduction: HPCS protects the infrastructure and management services offered to customers including instance provisioning. An instance refers to a virtual

More information

Virtualization. Michael Tsai 2015/06/08

Virtualization. Michael Tsai 2015/06/08 Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%

More information

Taxonomy of Hybrid Honeypots

Taxonomy of Hybrid Honeypots 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore Taxonomy of Hybrid Honeypots Hamid Mohammadzadeh.e.n 1, Masood Mansoori 2 and Roza

More information

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits: Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique

More information

Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring

Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring Document version 1.0 Gianluca Della Corte, IBM Tivoli Monitoring software engineer Antonio Sgro, IBM Tivoli Monitoring

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

Kernel comparison of OpenSolaris, Windows Vista and. Linux 2.6

Kernel comparison of OpenSolaris, Windows Vista and. Linux 2.6 Kernel comparison of OpenSolaris, Windows Vista and Linux 2.6 The idea of writing this paper is evoked by Max Bruning's view on Solaris, BSD and Linux. The comparison of advantages and disadvantages among

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have

More information

Virtualization for Security

Virtualization for Security Virtualization for Security t j Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting John Hoopes Technical Editor Aaron Bawcom Paul Kenealy Wesley J. Noonan Craig

More information

Solaris Virtualization and the Xen Hypervisor Frank Hofmann

Solaris Virtualization and the Xen Hypervisor Frank Hofmann Solaris Virtualization and the Xen Hypervisor Frank Hofmann Solaris Released Products Engineering Sun Microsystems UK All things in the world come from being. And being comes from non-being. Lao Tzu Overview

More information

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,

More information

Models For Modeling and Measuring the Performance of a Xen Virtual Server

Models For Modeling and Measuring the Performance of a Xen Virtual Server Measuring and Modeling the Performance of the Xen VMM Jie Lu, Lev Makhlis, Jianjiun Chen BMC Software Inc. Waltham, MA 2451 Server virtualization technology provides an alternative for server consolidation

More information

Comparing Virtualization Technologies

Comparing Virtualization Technologies CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational

More information

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

Network Security: From Firewalls to Internet Critters Some Issues for Discussion Network Security: From Firewalls to Internet Critters Some Issues for Discussion Slide 1 Presentation Contents!Firewalls!Viruses!Worms and Trojan Horses!Securing Information Servers Slide 2 Section 1:

More information

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services Firewalls What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services only authorized traffic is allowed Auditing and

More information

Sun xvm VirtualBox Product Overview

Sun xvm VirtualBox Product Overview Sun xvm VirtualBox Product Overview Orgad Kimchi ISV-E Engineering Sun Microsystems, Inc. 1 Agenda Background Product Overview Key Features 2 Background In January 2007, innotek went GNU public with the

More information

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006 CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on

More information

Solution Guide Parallels Virtualization for Linux

Solution Guide Parallels Virtualization for Linux Solution Guide Parallels Virtualization for Linux Overview Created in 1991, Linux was designed to be UNIX-compatible software that was composed entirely of open source or free software components. Linux

More information

OPEN SOURCE VIRTUALIZATION TRENDS. SYAMSUL ANUAR ABD NASIR Warix Technologies / Fedora Community Malaysia

OPEN SOURCE VIRTUALIZATION TRENDS. SYAMSUL ANUAR ABD NASIR Warix Technologies / Fedora Community Malaysia OPEN SOURCE VIRTUALIZATION TRENDS SYAMSUL ANUAR ABD NASIR Warix Technologies / Fedora Community Malaysia WHAT I WILL BE TALKING ON? Introduction to Virtualization Full Virtualization, Para Virtualization

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

Chapter 11 Cloud Application Development

Chapter 11 Cloud Application Development Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How

More information

A Whirlwind Introduction to Honeypots

A Whirlwind Introduction to Honeypots A Whirlwind Introduction to Honeypots Marcus J. Ranum What is a honeypot? A security resource thats value lies in being attacked, probed, or compromised A honeypot is more a state

More information

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Volume SYSLOG JUNCTION. User s Guide. User s Guide Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages

More information

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations

More information

Managed VPS Linux Technical Overview

Managed VPS Linux Technical Overview Managed VPS Linux Technical Overview Copyright 2006 VERIO Europe page 1 1 INTRODUCTION 4 1.1 Acknowledgements 4 1.2 Purpose of this Document 4 1.3 Navigating this Document 4 2 OVERVIEW OF VPS LINUX 5 2.1

More information

How To Install An Org Vm Server On A Virtual Box On An Ubuntu 7.1.3 (Orchestra) On A Windows Box On A Microsoft Zephyrus (Orroster) 2.5 (Orner)

How To Install An Org Vm Server On A Virtual Box On An Ubuntu 7.1.3 (Orchestra) On A Windows Box On A Microsoft Zephyrus (Orroster) 2.5 (Orner) Oracle Virtualization Installing Oracle VM Server 3.0.3, Oracle VM Manager 3.0.3 and Deploying Oracle RAC 11gR2 (11.2.0.3) Oracle VM templates Linux x86 64 bit for test configuration In two posts I will

More information

How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself

How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,

More information

Digital evidence in virtual honeynets based on operating system level virtualization

Digital evidence in virtual honeynets based on operating system level virtualization Digital evidence in virtual honeynets based on operating system level virtualization Security and Protection of Information 2013, 22.-24.5.2013, Brno Pavol Sokol, Peter Pisarčík 2 Outline 1) Introduction

More information

OS Virtualization Frank Hofmann

OS Virtualization Frank Hofmann OS Virtualization Frank Hofmann OP/N1 Released Products Engineering Sun Microsystems UK Overview Different approaches to virtualization > Compartmentalization > System Personalities > Virtual Machines

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Pavel Anni Oracle Operating Systems & Virtualization Overview 2 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion

More information

Virtualization. Types of Interfaces

Virtualization. Types of Interfaces Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity

More information

Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Web Application

More information

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following

More information

Linux Virtualization. Kir Kolyshkin <kir@openvz.org> OpenVZ project manager

Linux Virtualization. Kir Kolyshkin <kir@openvz.org> OpenVZ project manager Linux Virtualization Kir Kolyshkin OpenVZ project manager What is virtualization? Virtualization is a technique for deploying technologies. Virtualization creates a level of indirection

More information

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01 How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot

More information

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 SWsoft Virtuozzo 3.5.1 (for Windows) Review 2 Summary 0. Introduction 1. Installation 2. VPSs creation and modification

More information

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Check Point SecurePlatform Firewall security platform for use in the systems with increased security requirements IT technologies are essential for proper operation of majority

More information

Virtualization and the U2 Databases

Virtualization and the U2 Databases Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the

More information

Virtualization Technologies ORACLE TECHNICAL WHITE PAPER OCTOBER 2015

Virtualization Technologies ORACLE TECHNICAL WHITE PAPER OCTOBER 2015 Virtualization Technologies ORACLE TECHNICAL WHITE PAPER OCTOBER 2015 Table of Contents Introduction 3 Designing a Consolidated Infrastructure 6 Seven Areas of Consideration for Consolidation 6 Security

More information

HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE

HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE Level 1, 61 Davey St Hobart, TAS 7000 T (03) 6165 1555 www.getbusi.com Table of Contents ABOUT THIS MANUAL! 1 SYSTEM REQUIREMENTS! 2 Hardware

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Server Virtualization: The Essentials

Server Virtualization: The Essentials Server Virtualization: The Essentials Part 1 of 4 Jim Smith TeamQuest TeamQuest and the TeamQuest logo are registered trademarks in the US, EU and elsewhere. All other trademarks and service marks are

More information

Chapter 3 Operating-System Structures

Chapter 3 Operating-System Structures Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual

More information

Countermeasure for Detection of Honeypot Deployment

Countermeasure for Detection of Honeypot Deployment Proceedings of the International Conference on Computer and Communication Engineering 2008 May 13-15, 2008 Kuala Lumpur, Malaysia Countermeasure for Detection of Honeypot Deployment Lai-Ming Shiue 1, Shang-Juh

More information

Using SmartOS as a Hypervisor

Using SmartOS as a Hypervisor Using SmartOS as a Hypervisor SCALE 10x Robert Mustacchi rm@joyent.com (@rmustacc) Software Engineer What is SmartOS? Solaris heritage Zones - OS level virtualization Crossbow - virtual NICs ZFS - pooled

More information

The Review of Virtualization in an Isolated Computer Environment

The Review of Virtualization in an Isolated Computer Environment The Review of Virtualization in an Isolated Computer Environment Sunanda Assistant professor, Department of Computer Science & Engineering, Ludhiana College of Engineering & Technology, Ludhiana, Punjab,

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall. Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and

More information

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

Data Collection and Data Analysis in Honeypots and Honeynets

Data Collection and Data Analysis in Honeypots and Honeynets Data Collection and Data Analysis in Honeypots and Honeynets Pavol Sokol, Patrik Pekarčík, Tomáš Bajtoš pavol.sokol@upjs.sk, patrik.pekarcik@upjs.sk, tomas.bajtos@student.upjs.sk Institute of Computer

More information

A quantitative comparison between xen and kvm

A quantitative comparison between xen and kvm Home Search Collections Journals About Contact us My IOPscience A quantitative comparison between xen and kvm This content has been downloaded from IOPscience. Please scroll down to see the full text.

More information

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3

More information

Firewall Architecture

Firewall Architecture NEXTEP Broadband White Paper Firewall Architecture Understanding the purpose of a firewall when connecting to ADSL network services. A Nextep Broadband White Paper June 2001 Firewall Architecture WHAT

More information

Mauro Andreolini University of Modena andreolini@unimore.it. Michele Colajanni. colajanni@unimore.it. bulgarelli.alessandro@ unimore.

Mauro Andreolini University of Modena andreolini@unimore.it. Michele Colajanni. colajanni@unimore.it. bulgarelli.alessandro@ unimore. HoneySpam: Honeypots fighting SPAM at the source Mauro Andreolini University of Modena andreolini@unimore.it Alessandro Bulgarelli University of Modena bulgarelli.alessandro@ unimore.it Michele Colajanni

More information

Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh

Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh Introduction History, Advantages, Common Uses OS-Level Virtualization Hypervisors Type 1 vs. type 2 hypervisors

More information

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality

More information

The current version installed on your server is 2.6.32-431.5.1.el6.x86_64 and it's the latest available.

The current version installed on your server is 2.6.32-431.5.1.el6.x86_64 and it's the latest available. IP : nnn.nnn.nnn.n 173.255.141.4 Hostname : example.domain.com webserver.theewfinc.org OS : CentOS release 6.6 (Final) The following is a report on the security and performance of your server. It includes

More information

High Level Design Distributed Network Traffic Controller

High Level Design Distributed Network Traffic Controller High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction

More information

LAN Based Intrusion Detection And Alerts

LAN Based Intrusion Detection And Alerts LAN Based Intrusion Detection And Alerts Vivek Malik, Mohit Jhawar, Harleen, Akshay Khanijau, Nakul Chawla Abstract : With the ever increasing size and number of networks around the world, the network

More information

Virtualization for Cloud Computing

Virtualization for Cloud Computing Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources

More information