Advertisement

Virtual Machine Based Autonomous Web Server

  • Mohd Zaki Mas’ud
  • Faizal Mohd Abdollah
  • Asrul Hadi Yaacob
  • Nazrul Muhaimin Ahmad
  • Erman Hamid
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 157)

Abstract

Enterprises are turning to Internet technology to circulate information, interact with potential customers and establish an e-commerce business presence. These activities are depending highly on Web server and maintaining good server security has been a requirement for avoiding any malicious attacks especially web defacements and malware. Web server administrators should be alert and attentive to the status of the server at all time. They need to be persistent in monitoring the server in order to detect any attempted attacks. This is an advantage for a web server that is maintained by a big company that has a big budget to hire a knowledgeable web server administrator, for a new established small company it will only burden their expenses. To overcome this problem, this paper proposes a low cost system called Autonomous Web Server Administrator (AWSA) that is fully developed using open source software. AWSA combines several computing concepts such as Virtual Machine, Intrusion Detection System and Checksum. AWSA offers a Virtual Machine based Web server that has the ability to automatically detect intrusions and reconstruct corrupted data or the file system without any human intervention.

Keywords

Virtual Machine Intrusion Detection System Virtual Machine Monitor Integrity Checker Online Business 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    CyberSecurity Malaysia, MyCERT Incident Statistics (September 2010) (On-line), http://www.mycert.org.my/en/services/statistic/mycert/2010/main/detail/725/index.html
  2. 2.
    Popek, G., Goldberg, R.: Formal Requirements for Virtualizable Third Generation Architectures. Communications of the ACM 17(7), 412–421 (1974)MathSciNetzbMATHCrossRefGoogle Scholar
  3. 3.
    Dunlap, G.W., King, S.T., Cinar, S., Basrai, M.A., Chen, P.M.: ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. In: Proceeding of 2002 Symposium on Operating System Design and Implementation (2002)Google Scholar
  4. 4.
    VMware Inc., VMware Workstation (April 05, 2009) (Online), http://www.vmware.com/
  5. 5.
    Sun Microsystem, Virtualbox (April 05, 2009) (Online), http://www.virtualbox.org/
  6. 6.
    Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 164–177 (2003)Google Scholar
  7. 7.
    Bellard, F.: QEMU CPU Emulator (January 1, 2009) (On-line), http://fabrice.bellard.free.fr/qemu/
  8. 8.
    Garfinkel, T., Paff, B., Chow, J., Rosemblum, M., Boneh, D.: TERRA: A virtual Machine-Based Platform Trusted Computing. In: SOSP 2003, pp. 193–205 (2003)Google Scholar
  9. 9.
    Dunlap, G.W., King, S.T., Cinar, S., Basrai, M.A., Chen, P.M.: ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. In: Proceeding of 2002 Symposium on Operating System Design and Implementation (2002)Google Scholar
  10. 10.
    Garfinkel, T., Rosenblum, M.A.: Virtual Machine Introspection Based Architecture for Intrusion Detection. In: Proc. Network and Distributed System Security Symposium (2003)Google Scholar
  11. 11.
    Laureano, M., Maziero, C., Jamhour, E.: Intrusion Detection in Virtual Machine Environments. In: Proc. EUROMICRO Conference, vol. 30 (2000)Google Scholar
  12. 12.
    Sourcefire Inc. Snort – The Open Source Network Intrusion Detection System (October 1, 2009) (On-line), http://www.snort.org
  13. 13.
    Sourceforge, Swatch (October 1, 2009) (On-line), http://swatch.sourceforge.net
  14. 14.
    Wichman, R.: Linux Kernel Rootkits (November 21, 2009) (On-line), http://la-samhna.de/library/rootkits/index.html
  15. 15.
    Packet Storm (November 21, 2009) (On-line), http://packetstormsecurity.org.pk/UNIX/penetration/rootkits/index.html (retrieved)
  16. 16.
    Hoobie Inc. Brutus - The remote password cracker (October 10, 2009) (On-line), http://www.hoobie.net/brutus/

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Mohd Zaki Mas’ud
    • 1
  • Faizal Mohd Abdollah
    • 1
  • Asrul Hadi Yaacob
    • 1
  • Nazrul Muhaimin Ahmad
    • 1
  • Erman Hamid
    • 1
  1. 1.Faculty of Information and Communication TechnologyUniveristi Teknikal MalaysiaDurian TunggalMalaysia

Personalised recommendations