期刊文献+

基于虚拟化的安全监控 被引量:63

Virtualization-Based Security Monitoring
下载PDF
导出
摘要 近年来,虚拟化技术成为计算机系统结构的发展趋势,并为安全监控提供了一种解决思路.由于虚拟机管理器具有更高的权限和更小的可信计算基,利用虚拟机管理器在单独的虚拟机中部署安全工具能够对目标虚拟机进行检测.这种方法能够保证监控工具的有效性和防攻击性.从技术实现的角度来看,现有的研究工作可以分为内部监控和外部监控.根据不同的监控目的,详细地介绍了基于虚拟化安全监控的相关工作,例如入侵检测、蜜罐、文件完整性监控、恶意代码检测与分析、安全监控架构和安全监控通用性.最后总结了现有研究工作的不足,并指出了未来的研究方向.这对于从事虚拟化研究和安全监控研究都具有重要意义. In recent years, virtualization technology is the novel trendy of computer architecture, and it provides a solution for security monitoring. Due to the highest privilege and the smaller trusted computing base of virtual machine monitor, security tools, deployed in an isolated virtual machine, can inspect the target virtual machine with the help of virtual machine monitor. This approach can enhance the effectiveness and anti-attack ability of security tools. From the aspect of the implementation technologies, existing research works can be classified into internal monitoring and external monitoring. According to the different targets, the related works about virtualization-based monitoring are introduced in this paper in detail, such as intrusion detection, honeypot, file integrity monitoring, malware detection and analysis, security monitoring architecture and the generality of monitoring. Finally, this paper summarizes the shortcomings of existing works, and presents the future research directions. It is significant for virtualization research and security monitoring research.
出处 《软件学报》 EI CSCD 北大核心 2012年第8期2173-2187,共15页 Journal of Software
基金 国家自然科学基金(60973038 61142010) 国家高技术研究发展计划(863)(2012AA012600) 武汉市科技攻关项目(201010621211) 信息网络安全公安部重点实验室开放课题(C11602)
关键词 虚拟化 虚拟机管理器 安全监控 虚拟机自省 virtualization virtual machine monitor security monitoring virtual machine introspection
  • 相关文献

参考文献4

二级参考文献76

  • 1陈晓梅.入侵检测产品的评价研究[J].微电子学与计算机,2005,22(9):74-76. 被引量:5
  • 2唐勇,卢锡城,胡华平,朱培栋.基于多序列联配的攻击特征自动提取技术研究[J].计算机学报,2006,29(9):1533-1541. 被引量:25
  • 3The Intmational Organization for Standardization, Common Criteria Information Technology Security Evaluation[S],ISO/IEC 15408:1999.
  • 4Wierschon S T. Discriminative Power of the Receptors Activated by K-contiguous Bits Rule[J]. Journal of Computer Science and Technology, 2000, 1 (3): 65-67.
  • 5The tcpdump program.2007.http://www.tcpdump.org.
  • 6Xen Project.Xen Interface Manual.March 2007.http://www.cl.cam.ac.uk/Research/SR.G/notes/xen/readmes/interface/interface/interface.html.
  • 7David Cisnall.The definitive guide to the Xen hypervisor.PRENTICE HALL.2007.
  • 8Tim Abels,Puneet Dhawan,Balasubramanian Chandrasekaran.An Overview of Xen Virtualization.March 2007.http://www.dell.com/downloads/global/power/ps3q05-20050191-Abels.pdf.
  • 9Whitaker A J.Building Robust Systems with Virtual Machine Monitors.Univ.Washington Generals Examination,2004.
  • 10Syslog configuration.http://www.die.net/doc/linux/man/man5/syslog.conf.5.html.

共引文献12

同被引文献324

引证文献63

二级引证文献235

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部