Embed presentation
Downloaded 11 times


The document proposes a system that uses isolation and intrusion detection techniques to provide resistance to attacks and rapid recovery. It isolates user data in a file system virtual machine and applications in virtual machine appliances. A network virtual machine incorporates intrusion detection and firewalls. Virtual machine contracts define acceptable behavior for network, file system, and resource access and limits. The network and file system virtual machines enforce the contract rules. The system is implemented using the Xen hypervisor and is evaluated for performance and effectiveness against attacks.
