Compliance vs business security
โ Scribed by Dario Forte
- Publisher
- Elsevier Science
- Year
- 2009
- Tongue
- English
- Weight
- 302 KB
- Volume
- 2009
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
This exploit overflows a buffer used in the handling of paginit's commandline arguments, providing elevated privileges. Pass or fail criteria: Pass or Identified Packet loss: No
Extended work
There are several developments that would be worth exploring. In the distributed environment, given an intrusion at the guest applications level that is detected by the self-healing mechanism, it may be be possible to make a spoof call to the host OS so that: 1. The host OS will execute the spoofing code and transfer the hacker's packets to some other useless system, while application packets are still communicated to the actual system using self-monitoring of the IDS. 2. The trusted environment will provide self-healing mechanisms for applications. 3. Once we trace the hacker and take countermeasures, we can make an anti-spoof call from the host OS. 4. Spoofing code can be added to the IDS source code and its policies.
Conclusion
We have provided an overview of a novel architecture for enhanced security using virtualisation and spoofing. In this architecture, the guest operating system is considered as a production system and the host operating system is considered as a trusted system. This architecture can provide self-monitoring and self-healing mechanisms within a safe environment, so the mechanisms themselves are not compromised.
๐ SIMILAR VOLUMES
October 7 997 Network Security and firewall technology which is ideally suited to mass electronic commerce services, such as home banking and virtual shopping.