期刊文献+

基于云计算的安全管理平台技术研究 被引量:1

Research on Security Operations Center Technology Based on Cloud Computing
原文传递
导出
摘要 提出了一种基于云计算的安全管理平台模型。该模型采用先进的云计算技术,利用其提供的强大的数据处理能力解决海量安全事件处理效率低的难题;实现对网络安全设备的分布化、虚拟化、服务透明化的实时管理;充分保证网络的安全性、可靠性,降低网络风险。通过与传统的安全管理平台的比较表明,该模型在数据处理能力、安全性、高可用性等方面性能显著提高。 A new model of security operations center(SOC) based on cloud computing is presented.The advanced cloud computing technology is used in the model to improve the efficiency of dealing with massive security alerts by utilizing the high data processing ability of the cloud computing.The proposed SOC can provide the real-time management of distribution,virtualization and service transparency for network security devices and ensure the security,reliability,and low risk for the network.Comparing with the traditional security operations center,the experiment results indicate that the model can get much higher performance in data processing ability,security,high availability,etc.
出处 《电子技术(上海)》 2011年第12期8-10,7,共4页 Electronic Technology
基金 国家973项目(No.2007CB311203) 国家自然科学基金(No.60803157 90812001) 山东省自然科学基金项目(No.ZR2009GM009) 国家标准制定计划(No.20080200-T-339) 国家质检公益性科研专项(No.10-126)
关键词 云计算 安全管理平台 事件关联分析 网络安全 cloud computing security operations center alert correlation analysis network security
  • 相关文献

参考文献10

二级参考文献135

  • 1Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 2Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 3Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.
  • 4Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11.
  • 5Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28.
  • 6Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117.
  • 7Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43.
  • 8Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. In: Proc. of the 6th Symp. on Operating System Design and Implementation. Berkeley: USENIX Association, 2004. 137-150.
  • 9Burrows M. The chubby lock service for loosely-coupled distributed systems. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 335-350.
  • 10Chang F, Dean J, Ghemawat S, Hsieh WC, Wallach DA, Burrows M, Chandra T, Fikes A, Gruber RE. Bigtable: A distributed storage system for structured data. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 205-218.

共引文献2576

同被引文献3

  • 1赖睿.运营商IP网安全管理平台SOC的设计与工程实现[D].陕西:西安电子科技大学,2012.
  • 2MSTLJUF04-0190101-2006信息安全技术安全管理平台产品检验规范[s].公安部计算机信息系统安全产品质量监督检验中心.2006-01-01.
  • 3田燕,张新刚,梁晶晶,刘妍.基于身份认证和访问控制的云安全管理平台[J].测控技术,2013,32(2):97-99. 被引量:7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部