Execution time measurement of virtual machine volatile artifacts analyzers

dc.contributor.authorKumara, M.A.A.
dc.contributor.authorJaidhar, C.D.
dc.date.accessioned2020-03-30T10:18:48Z
dc.date.available2020-03-30T10:18:48Z
dc.date.issued2016
dc.description.abstractDue to a rapid revaluation in a virtualization environment, Virtual Machines (VMs) are target point for an attacker to gain privileged access of the virtual infrastructure. The Advanced Persistent Threats (APTs) such as malware, rootkit, spyware, etc. are more potent to bypass the existing defense mechanisms designed for VM. To address this issue, Virtual Machine Introspection (VMI) emerged as a promising approach that monitors run state of the VM externally from hypervisor. However, limitation of VMI lies with semantic gap. An open source tool called LibVMI address the semantic gap. Memory Forensic Analysis (MFA) tool such as Volatility can also be used to address the semantic gap. But, it needs to capture a memory dump (RAM) as input. Memory dump acquires time and its analysis time is highly crucial if Intrusion Detection System IDS (IDS) depends on the data supplied by FAM or VMI tool. In this work, live virtual machine RAM dump acquire time of LibVMI is measured. In addition, captured memory dump analysis time consumed by Volatility is measured and compared with other memory analyzer such as Rekall. It is observed through experimental results that, Rekall takes more execution time as compared to Volatility for most of the plugins. Further, Volatility and Rekall are compared with LibVMI. It is noticed that examining the volatile data through LibVMI is faster as it eliminates memory dump acquire time. � 2015 IEEE.en_US
dc.identifier.citationProceedings of the International Conference on Parallel and Distributed Systems - ICPADS, 2016, Vol.2016-January, , pp.314-319en_US
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/8480
dc.titleExecution time measurement of virtual machine volatile artifacts analyzersen_US
dc.typeBook chapteren_US

Files