\documentclass[titlepage,final,onecolumn,a4paper,11pt,openright]{report}
\usepackage{times}
\input{style.tex}

%\setlength\topmargin{0in}
%\setlength\headheight{0.8in}
\setlength\headsep{1.0in}
\setlength\textheight{8.2in}
\setlength\textwidth{6.5in}
\setlength\oddsidemargin{0.15in}
\setlength\evensidemargin{0.15in}
\setlength\parindent{0.08in}
\setlength\parskip{0.10in}



\begin{document}

% Article top matter
\title{\textbf{Intrusion Detection using XEN Virtualization}} 
\author{\textbf{P Nilushan M Silva}\\		
        University of Colombo School of Computing,\\
		Sri Lanka,\\
		\texttt{\href{mailto:nilushanucsc@gmail.com}{nilushanucsc@gmail.com}}\\
		\\
		\textbf{Index No.  : 2004 CS 096}\\
		\textbf{Supervisor : Dr. Chamath Keppetiyagama}}  
\date{16-07-2007} 
\maketitle

% *************** Table of contents ***************
%\normalfont
\pagenumbering{roman}
%\pagestyle{empty}

\fontfamily{cmr}
\selectfont

\tableofcontents

\clearpage
\listoffigures

\begin{abstract}
\textsl{Virtualization provides many uses for the Computer Systems today. Securing Applications and Systems has been one of the main features provided by Virtualization. 
The Architecture and properties of Virtualization can be used to implement Intrusion Detection Systems in a Reliable way. This Literary Survey will focus on giving information about how virtualization has enabled the implementation of successfull Intrusion Detection Systems.
This will be done with the Exploration as to how XEN virtualization can be used to Implement the Intrusion Detection System.
}
\end{abstract}

\pagenumbering{arabic}
\pagestyle{headings}

\input{Chap_intro.tex}

\input{Chap_IDS.tex}

\input{Chap_Virt.tex}

\input{IDS_VMMIDS.tex}

\input{Chap_IMP.tex}

\chapter{Conclusion}

Virtualization has provided a boom in many fields of Computer Science and is enabling many fields of Studies to be carried out based on the luxurious properties it provides.

I surveyed out for the available mechanisms to propose a better Intrusion Detection System with the Use of Virtualization. The survey was based on a IDS that is placed on the monitored Host, but not giving the ability for the IDS to get attacked even thought its on the same Physical Machine. 

The faults and difficulties in providing a good IDS has been solved to a great extent by this approach. The positive points which Virtualization enable are immense. Still there are some issues which virtualization have caused, hopefully as Virtualization Technology Matures the issues will be resolved.

The current architectures of Virtualization does enable the Design of such Systems, yet the implementation of the great power that Virtualization holds has not been steadily available, and is still in the research interests. Even Though its in the research level the promise of providing great benefits is imminent.

There are many other benefits and many kinds of Projects coming up based on virtualization to enable strong security, these ideas and systems combined will enable many possibilities in the field of Secure Systems and Perfect Intrusion Detection and Prevention Systems.




\chapter*{Glossary}
\begin{itemize}
\item IDS 	-	Intrusion Detection System
\item NIDS	-	Network based Intrusion Detection System
\item HIDS	-	Host based Intrusion Detection System
\item VMM	-	Virtual Machine Monitor
\item SVFS	-	Secure Virtual File System
\item DVM	-	Data Virtual Machine


\end{itemize}



\chapter*{Acknowledgements}
I would like to extend my sincere thanks to Dr. Chamath Keppetiyagama, supervisor of this Literature Survey for the instructions he provided for writing papers and regarding the subject matter. Dr. Chamath showed a great interest in the topic and motivated me a lot and directed me towards this very interesting but challenging topic. 
I should also thank Dr. Premarathna for all the support and guidence he provided not only to me but for all of us doing the literature Survey. He constantly extended his support, kept us well notified and well aware about the Survey.
I am greatfull to the authors of the references I have used, for the reasearch they have done and for publishing their findings so that we can build our ideas upon their reasearch.




\bibliographystyle{plain}
\bibliography{Ref}

\end{document}  %End of document.
