Hiding File Manipulation of Essential Services by System Call Proxy

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Abstract

Security software or logging programs are frequently attacked because they are an obstruction to attackers. Protecting these essential services from attack is crucial to preventing and mitigating damage. Hiding information related to essential services, such as that of the files and processes, can help to deter attacks on these services. This paper proposes a method of hiding file manipulation for essential services. The method makes the files invisible to all services except their corresponding essential services and provides access methods to those files in a virtual machine (VM) environment. In the proposed method, system calls to those files are executed by a proxy process on the other VM. The original system call is not executed in the operating system of the original VM, however, the result of file access is returned to the original process. Thus, the files of essential services are placed on the other VM and other processes on the original VM cannot access to them. Therefore, the proposed method can prevent or deter identification of essential services based on file information monitoring.

Original languageEnglish
Title of host publicationLecture Notes on Data Engineering and Communications Technologies
PublisherSpringer
Pages853-863
Number of pages11
DOIs
Publication statusPublished - 2019

Publication series

NameLecture Notes on Data Engineering and Communications Technologies
Volume22
ISSN (Print)2367-4512
ISSN (Electronic)2367-4520

Keywords

  • File access
  • Security
  • Virtual machine

ASJC Scopus subject areas

  • Media Technology
  • Electrical and Electronic Engineering
  • Computer Science Applications
  • Computer Networks and Communications
  • Information Systems

Fingerprint Dive into the research topics of 'Hiding File Manipulation of Essential Services by System Call Proxy'. Together they form a unique fingerprint.

  • Cite this

    Sato, M., Taniguchi, H., & Yamauchi, T. (2019). Hiding File Manipulation of Essential Services by System Call Proxy. In Lecture Notes on Data Engineering and Communications Technologies (pp. 853-863). (Lecture Notes on Data Engineering and Communications Technologies; Vol. 22). Springer. https://doi.org/10.1007/978-3-319-98530-5_76