The document discusses a system that provides rapid recovery from attacks and increased security for virtual machines using techniques like virtual machine checkpoints, network and file system monitoring to isolate attacks and roll back changes, and defining rules to restrict the behavior of virtual appliances. It proposes a prototype architecture that leverages these techniques and evaluates performance and functionality. The plan of work is to further integrate network and file system monitoring components tightly with the Xen virtual machine monitor and implement a comprehensive set of rules for defining allowed virtual appliance behaviors.