×

Virtual machine file system restriction system and method

  • US 9,450,960 B1
  • Filed: 11/05/2008
  • Issued: 09/20/2016
  • Est. Priority Date: 11/05/2008
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • executing a host operating system on a host computing system;

    creating a first virtual machine within the host operating system, the first virtual machine comprising;

    a remote file system;

    a file system service; and

    a security application between said remote file system and said file system service;

    creating a second virtual machine within the host operating system of the host computing system, the second virtual machine comprising a Uniform Naming Convention (UNC) file system driver of the second virtual machine configured to cause all input/output operations processed in a kernel mode from said second virtual machine to be redirected to said remote file system of the first virtual machine via the security application of the first virtual machine, wherein the input/output operations are processed in a user mode in said remote file system;

    booting said second virtual machine, wherein said booting said second virtual machine comprises loading a boot block from said first virtual machine and redirecting booting of said second virtual machine to said remote file system;

    determining, upon an outbreak of unknown malicious code, at least one unknown malicious code characteristic, wherein the unknown malicious code characteristic comprises at least one file attribute comprising at least one of an outbreak time period, a file type, a source, a file name, and a file size; and

    restricting, by the security application of the first virtual machine, access of said second virtual machine to said remote file system, wherein the restricting is performed based on the determined unknown malicious code characteristic, wherein the restricting is further performed based on configured rules relating the at least one file attribute and the unknown malicious code characteristic.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×