期刊文献+

基于Xen硬件虚拟机的虚拟蜜网研究 被引量:3

Study on Virtual Honeynet with Xen Hardware Virtual Machine
原文传递
导出
摘要 虚拟蜜网由于其强大的捕捉和发现功能,以及相对低廉的成本,被网络管理员广泛的使用。然而,其隐秘性相对较差,容易被比较谨慎的攻击者发现甚至反利用。文章基于Xen虚拟机这一开源虚拟机,提出了一种在硬件虚拟机上架构蜜网的方法,以提高攻击者探测发现虚拟蜜网的难度。 Virtual Honeynet is acquires widespread acceptance and deployment due to its cost efficiency and relatively powerful feature set. However, its invisibility is often a questionable matter and, it is easy to be discovered and exploited. This paper presents a novel way for building virtual honeynet based on Xen virtual machine monitor, thus to considerably improve the invisibility and raise the difficulty for attackers to discover.
出处 《信息安全与通信保密》 2008年第6期83-85,88,共4页 Information Security and Communications Privacy
关键词 虚拟蜜网 XEN 硬件虚拟机 virtual honeynet Xen hardware virtual machine
  • 相关文献

参考文献5

  • 1[1]The Honeynet Project:Know Your Enemy:Honeynets[DB/OL].http://www.honeynetorg/papers/honeynet/,2005.
  • 2[2]The Honeynet Project:Know Your Enemy:Defining Virtual Honeynet[DB/OL].http://www.honeynet.org/papers/virtual/,2003.
  • 3[3]Quynh N A,Takefuji Y.Towards an Invisible Honeypot Monitoring System[C].ACISP,2006.
  • 4[4]Barbara P,Dragovic B,Fraser K,et al.Xen and the Art of Virtualization[C].Proceedings of the ACM Symposium on Opearating Systems Principles,2003.
  • 5[5]Dong Y,Li S,et al.Extending Xen with Intel Virtualization Technology[DB/OL].http://developer.intel.com/technology/itj/2006/v10i3/3-xen/1-abstract.htm,2006.

同被引文献24

  • 1陈冀军,张欣星,黄皓.基于Xen虚拟机的密罐系统设计[J].信息安全与通信保密,2007,29(7):84-86. 被引量:2
  • 2BARHAM P, DRAGOVIC B, FRASER K, et al. Xen and the Art ofVirtualization[J]. ACM, 2003(08): 164-177.
  • 3GARFINKEL T, ADAMS K, WARFIELD A, et al. Compatibility Is Not Transparency: Vmm Detection Myths and Realities[C]// HOTO'07: Proceedings of the 11thconfernee on Hot Topics in Operating Systems. NY, USA: ACM Press, 2007.
  • 4KARGER P. Performance and Security Lessons Learned from Virtualizing the Alpha processor[C]//ISCA '07 : Proceedings of the 34th Annual International Sysposium on Computer Architecture. New York, NY, USA: ACMPress, 2007: 392-401.
  • 5Secunia.com. Xen Multiple Vulnerabilities[EB/OL]. (2007-03-05) [2010-10-11]. http: //secunia.com/advisories/26986/.
  • 6TAVIS O. An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments[EB/OL]. (2007-05-10)[2010- 10-15]. http : //taviso.decsystem.org/virtsec.pdf.
  • 7SAILER R, VALDEZ E, JAEGER T, et al. Shype: Secure Hypervisor Approach to Trusted Virtualized System[EB/OL]. (2005-07-05)[2010-10-20]. http: //citeseerx.ist.psu.edu/ viewdoc/download?doi= 10.1.1.120.5037&rep=rep 1 &type=pdf.
  • 8NEIGER G, SANTONI A, LEUNG F. Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization[J]. Intel Technology Journal, 2006, 10(3) : 167-177.
  • 9BARHAM P, DRAGOVIC B, FRASER K, et al. Xen and the Art of Virtualization[C]//ACM.SOSP'03 Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. NewYork: ACM, 2003: 164-177.
  • 10ARTEM D, PAUL R, MONIRUL S, et al. Ether: Malware Analysis via Hardware Virtualization Extensions[C]//ACM. CCS2008. NewYork: ACM, 2008: 51-62.

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部