Defend Against Denial of Service Attack with VMM

Siqin Zhao,Kang Chen,Weimin Zheng
DOI: https://doi.org/10.1109/gcc.2009.14
2009-01-01
Abstract:When a denial-of-service happens, the malicious programs often occupies too much computing resources. A defending schema proposed in this paper can use virtual machine monitor to detect such attack by adapting threshold of available resources. If the defending system assures existence of attack, it will live duplicates the operating system together with the tagged applications to reserved isolated environment. The isolated environment is another virtual machine that is similar to the original one. At the meantime, execution of the operating system and tagged application keeps continuously both in new environment and original one. Through this way, the defending system can protect the running of the operating system and tagged applications from denial-of-service attack.
What problem does this paper attempt to address?