Modeling and Virtualization for Secure Computing Environments
Modeling and virtualization are typical methodologies used to develop efficient security enhancement techniques. Modeling approximates complex human or software behaviors with limited resources and enables effective analysis of usage patterns. Virtualization allows simulating existing computing resources, adding some capabilities such as access control and/or modifying semantics. Thus entities accessing computer resources are handled by modeling, whereas the resources themselves can be managed through virtualization. This invited talk describes our approaches and experiences that takes advantage of both methodologies.
KeywordsIntrusion Detection Intrusion Detection System Software Circulation Secure Software Software Behavior
- 1.Abe, H., Oyama, Y., Oka, M., Kato, K.: Optimization of intrusion detection system based on static analyses. IPSJ Transactions on Advanced Computing Systems(In Japanese) 45(SIG 3(ACS 5)), 11–20 (March 2004)Google Scholar
- 3.Oka, M., Oyama, Y., Abe, H., Kato, K.: Anomaly detection using layered networks based on eigen co-occurrence matrix. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 223–237. Springer, Heidelberg (2004)Google Scholar
- 4.Oyama, Y., Kanda, K., Kato, K.: Design and implementation of secure software execution system softwarepot. Computer Software(In Japanese) 19(6), 2–12 (2002)Google Scholar
- 5.Wagner, D., Dean, D.: Intrusion detection via static analysis. In: Proc. IEEE Symposium on Security and Privacy, pp. 156–168 (May 2001)Google Scholar