Automated Virtual Machine Introspection for Host-Based Intrusion Detection