期刊文献+

一种面向云计算环境下虚拟机的威胁建模方法 被引量:2

Approach to threat modeling of virtual machine in cloud computing environment
下载PDF
导出
摘要 针对云计算环境中虚拟机平台存在的弱点和漏洞,分析研究了虚拟机可能面临的威胁和攻击,基于STRIDE建模技术构建了云计算环境下虚拟机平台的安全威胁模型。并对威胁发生的可能性和严重程度进行量化,从而进一步评估整个云计算系统面临的安全威胁。 Aiming at the bugs and vulnerabilities of virtual machine platform under the cloud computing environment, the paper studies threats and attacks for virtual machines. And the model of VM security is built based on the STRIDE modeling technology. And then the paper makes a quantitative analysis of the possibility and severity of the threat, and evaluates the security threats that the cloud computing system faced.
出处 《现代电子技术》 2012年第19期70-72,共3页 Modern Electronics Technique
关键词 云计算 虚拟机 STRIDE 威胁建模 cloud computing virtual machine STRIDE threat modeling
  • 相关文献

参考文献15

  • 1BUYYA R, YEO C S, VENUGOPAL S. Market-oriented cloud computing: vision, hype and reality for ddivering it serv- ices as computing utilities [C]// 10th IEEE International Con- ference on High Performance Computing and Communica- tions. Dalian, China: IEEE, 2008: 5-13.
  • 2佚名.2011七大网络安全威胁报告[EB/OL].[2011-03-04].http://uetsecurity.51cto.com/art/201103/247267.htm.
  • 3CHEN Qian, YIN Yan, SU Ai-fang. Review of cloud mod- eling [C]// 2008 International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing. Shanghai, China: IEEE, 2008: 238-241.
  • 4JIA Tie-jun, WANG Xiao-gang. The construction and realiza- tion of the intelligent NIPS based on the cloud security [C]// 1st International Conference on Information Science and Engi- neering. Nanking, China: ICISE, 2009: 1885-1888.
  • 5SCHIFFMAN J, MOYER T, SHAL C, et al. Justifying integrity using a virtual machine [C]// 25th 2009 Annual Computer Security Applications Conference. Honolulu, HI, USA: ACSAC, 2009: 83-92.
  • 6Microsoft Corporation. Storing password using reversible encryption Microsoft documentation resource [R]. USA: Microsoft Corporation, 2004.
  • 751CT0.COM.从虚拟机中逃逸-虚拟环境安全威胁由理论变为现实[EB/OL].http://netsecurity.5lcto.com/art/200910/159852.htm.2009.10.
  • 8CLARK Christopher, FRASER Keir, HAND Steven, et al. Live migration of virtual machines [C]// Proceedings of 2nd Symposium on Networked Systems Design & Implementation. Boston, Massachusetts, USA: [s. n. ], 2007: 273-286.
  • 9OBERHEIDE Jon, COOKE Evan, JAHANIAN Farnam. Empirical exploitation of live virtual machine migration [C]// The llth IFIP/IEEE International Conference on Symposium on Integrated Network Management. Long Is- land, New York, USA.. IEEE, 2009: 630-637.
  • 10AVIRAM A, HU S, FORD B. Determinating timing channels in compute clouds [C]//Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop. Chicago, Illinois, USA:ACM, 2010:103-108.

二级参考文献4

共引文献156

同被引文献8

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部