A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
A guest-transparent file integrity monitoring method in virtualization environment
2010
Computers and Mathematics with Applications
The file system becomes the usual target of malicious attacks because it contains lots of sensitive data, such as executable programs, configuration and authorization information. File integrity monitoring is an effective approach to discover aggressive behavior by detecting modification actions on these sensitive files. Traditional real-time integrity monitoring tools, which insert hooks into the OS kernel, are easily controlled and disabled by malicious software. Such existing methods, which
doi:10.1016/j.camwa.2010.01.007
fatcat:eubo6ktevrcfbnsxaktbd7tnuu