期刊文献+

虚拟机在网络安全实验教学中的应用 被引量:5

Applications of Virtual Machine in Network Security Experiment Teaching
原文传递
导出
摘要 虚拟机技术在计算机中的应用越来越广泛。利用虚拟机技术可以高效、快速、低成本地搭建复杂的网络环境,特别是在网络安全方面,无论是在评估网络模型性能,病毒分析系统,还是网络环境模拟方面,虚拟机技术都发挥着关键性的支撑作用。文中介绍了如何利用VMware的网络安全工具虚拟机高效快捷地实现全套的网络安全实验。实践结果表明,通过NST完全可以在有限的单机资源上模拟复杂的网络环境,并实现网络攻防过程的演示教学。 Virtual machine technology is used more and more widely in computer applications. The complicated net-work environment could be built up effectively, fast and cheaply with virtual machine technology, especially in network security field. The virtual machine technology would play an important support role in performance evaluation of network model£^-virus analysis system and simulation of network environment, the virtual machine technology. This article describes how to effectively implement complete network security experiments by using VMware Network Security Toolkit (NST). The experimental results show that NST could fully simulate the complicated network environment and implement the demonstrative teaching of attack and defence process on the limited resources of a single physical machine.
作者 丁昱 庄城山
出处 《信息安全与通信保密》 2009年第10期71-72,共2页 Information Security and Communications Privacy
基金 安徽省高等学校教学质量与改革工程教学研究基金资助项目
关键词 虚拟机技术 网络安全 网络安全工具包 virtual machine technology network security network security toolkit(NST)
  • 相关文献

参考文献5

二级参考文献15

  • 1[1]Corey J.Local honeypot Identification[EB/OL].http://phrack.nl/phrack62/p62-0x07.txt,2004.
  • 2[2]Corey J.Advanced Honeypot Identification and Exploitation[EB/OL].http://www.phrack.org/fakes/p63/p63-0x09.txt,2004.
  • 3[3]Jiang Xuxian,Xu Dongyan,Wang Yimin.Collapsar:A VM-Based Honeyfarm and Reverse Honeyfarm Architecture for Network Atrack Capture and Detention[J].Journal of Parallel and Distributed Computing,Special Issue on Security In Grid and Distributed Systems,2006,66(9):1165-1180.
  • 4[4]Vrable M,Ma J,Chen J,et al.Scalability,Fidelity,and Containment in the Potemkin Virtual Honeyfarm[A].ACM SIGOPS Operating Systems Review[C].New York:ACM Press,2005:148-162.
  • 5[5]Daniela A S,Jedidiah R,Wassermann G,et al.VM-Based Full-System Replay for Attack Analysis and System Recovery[A].Architectural SuppoA for Programming Languages and Operating Systems[C].California San Jose,2006:66-71.
  • 6[6]Barham P,Dragovic B,Fraser K,et al.Xen and the Art of Virtualization[A].A CM Symposium on Operating Systems Principles[C].A CM Press:New York.2003:164-177.
  • 7[7]Xen 3.0 user manuls[EB/OL].http://www.cl.cam.ac.uk/research/srg/netos/xen/readmes/user.pdf,2005:26-27.
  • 8EricCole著 苏雷译.黑客-攻击透析与防范[M].北京:电子工业出版社,2002.18-45.
  • 9CERT, smurf IP Denial-of-Service Attacks, CERT advisory CA-98.01, Jan, 1998.
  • 10CERT, Results of the Distributed-Systems Intruder Tools Workshop, The CERT Coordination Center, Dec, 1999.

共引文献2

同被引文献25

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部