Virtual machine to detect intrusion or viruses

Wednesday, 10 October, 2012

Computer scientists have developed a technique to automatically allow one computer in a virtual network to monitor another for intrusions, viruses or anything else that could cause a computer to malfunction.

The technique has been dubbed ‘space travel’ because it sends computer data to a world outside its home and bridges the gap between computer hardware and software systems.

“Space travel might change the daily practice for many services offered virtually for cloud providers and data centres today, and as this technology becomes more popular in a few years, for the user at home on their desktop,” said Dr Zhiquian Lin, the research team’s leader and an assistant professor of computer science in the Erik Jonsson School of Engineering and Computer Science at the University of Texas at Dallas.

As cloud computing is becoming more popular, new techniques to protect the systems must be developed. Since this type of computing is internet-based, skilled computer specialists can control the main part of the system virtually - using software to emulate hardware.

Lin and his team programmed space travel to use existing code to gather information in a computer’s memory and automatically transfer it to a secure virtual machine - one that is isolated and protected from outside interference.

“You have an exact copy of the operating system of the computer inside the secure virtual machine that a hacker can’t compromise,” Lin said. “Using this machine ... the user or antivirus software can understand what’s happening, with the space travelled computer setting off red flags if there is any intrusion.”

Previously, the software developer had to manually write such tools.

“With our technique, the tools already being used on the computer become part of the defence process,” Lin said.

The gap between virtualised computer hardware and software operating on top of it was first characterised by Drs Peter Chen and Brian Noble, faculty members from the University of Michigan.

“The ability to leverage existing code goes a long way in solving the gap problem inherent to many types of virtual machine services,” said Chen, Arthur F Thurnau Professor of Electrical Engineering and Computer Science, who first proposed the gap in 2001. “Fu and Lin have developed an interesting way to take existing code from a trusted system and automatically use it to detect intrusions.”

Lin said the space travel technique will help the FBI understand what is happening inside a suspect’s computer even if they are physically miles away, instead of having to buy expensive software.

Related News

Mass adoption of smartphones tipping point for explosion in mobile payments technology, says Deloitte

A new report by professional services firm Deloitte explores how conventional payments...

Energy-efficiency hub for green data centres opened in Perth

APC has opened an energy-efficiency hub for green data centres in Perth which will provide...

prEmployees open enterprise to increased malware

RSA Online Fraud Report outlining how malware is making its way into enterprises through...

  • All content Copyright © 2024 Westwick-Farrow Pty Ltd