Please use this identifier to cite or link to this item: https://idr.l2.nitk.ac.in/jspui/handle/123456789/8480
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKumara, M.A.A.
dc.contributor.authorJaidhar, C.D.
dc.date.accessioned2020-03-30T10:18:48Z-
dc.date.available2020-03-30T10:18:48Z-
dc.date.issued2016
dc.identifier.citationProceedings of the International Conference on Parallel and Distributed Systems - ICPADS, 2016, Vol.2016-January, , pp.314-319en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/8480-
dc.description.abstractDue to a rapid revaluation in a virtualization environment, Virtual Machines (VMs) are target point for an attacker to gain privileged access of the virtual infrastructure. The Advanced Persistent Threats (APTs) such as malware, rootkit, spyware, etc. are more potent to bypass the existing defense mechanisms designed for VM. To address this issue, Virtual Machine Introspection (VMI) emerged as a promising approach that monitors run state of the VM externally from hypervisor. However, limitation of VMI lies with semantic gap. An open source tool called LibVMI address the semantic gap. Memory Forensic Analysis (MFA) tool such as Volatility can also be used to address the semantic gap. But, it needs to capture a memory dump (RAM) as input. Memory dump acquires time and its analysis time is highly crucial if Intrusion Detection System IDS (IDS) depends on the data supplied by FAM or VMI tool. In this work, live virtual machine RAM dump acquire time of LibVMI is measured. In addition, captured memory dump analysis time consumed by Volatility is measured and compared with other memory analyzer such as Rekall. It is observed through experimental results that, Rekall takes more execution time as compared to Volatility for most of the plugins. Further, Volatility and Rekall are compared with LibVMI. It is noticed that examining the volatile data through LibVMI is faster as it eliminates memory dump acquire time. � 2015 IEEE.en_US
dc.titleExecution time measurement of virtual machine volatile artifacts analyzersen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.