Kurniadi A.

Kurniadi A.

Toronto, Ontario, Canada
629 followers 500+ connections

Activity

Licenses & Certifications

  • SAP Certified Application Associate - SAP HANA 1.0

    SAP

    Issued
  • SAP Certified Development Consultant – NetWeaver 2004s - Portal

    SAP

    Issued
  • SAP Certified Solution Manager

    SAP

    Issued

Publications

  • Using VMM-Based Sensors to Monitor Honeypots

    2nd International Conference on Virtual Execution Environments (VEE 2006)

    Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system for collecting information about attacks on honeypots. We document and evaluate three designs we have implemented on two opensource virtualization platforms: User-Mode Linux and Xen. Our results show that our designs give the monitor good visibility into the system and thus, a small number of monitoring sensors can…

    Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system for collecting information about attacks on honeypots. We document and evaluate three designs we have implemented on two opensource virtualization platforms: User-Mode Linux and Xen. Our results show that our designs give the monitor good visibility into the system and thus, a small number of monitoring sensors can detect a large number of intrusions. In a three month period, we were able to detect five different attacks, as well as collect and try 46 more exploits on our honeypots. All attacks were detected with only two monitoring sensors. We found that the performance overhead for monitoring such intrusions is independent of which events are being monitored, but depends entirely on the number of monitoring events and the underlying monitoring implementation. The performance overhead can be significantly improved by implementing the monitor directly in the privileged code of the VMM, though at the cost of increasing the size of the trusted computing base of the system.

    Other authors
    See publication

Recommendations received

View Kurniadi’s full profile

  • See who you know in common
  • Get introduced
  • Contact Kurniadi directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Kurniadi A.

Add new skills with these courses