期刊文献+

基于OpenFlow的虚拟机流量检测系统的设计与实现 被引量:7

Design and implementation of virtual machine traffic detection system based on OpenFlow
下载PDF
导出
摘要 云平台下的虚拟机在物理机内部交互流量,而不通过防火墙等安全组件。针对这类流量无法在网络边界被获取并检测的问题,分析了OpenFlow技术的原理,提出了一种基于OpenFlow技术将虚拟机流量重定向到入侵检测系统进行检测的方案。方案使用OpenFlow虚拟交换机和控制器替代传统交换机,然后基于OpenFlow技术控制流量转发过程,将其导向外部的安全组件进行处理,并构建了由虚拟交换机、控制单元、入侵检测和系统配置管理4个模块组成的流量检测系统。实验结果表明,系统能够在满足虚拟机网络正常使用的前提下,将待监管流量导向入侵检测系统进行处理,而且能够同时提供交换机级及虚拟机级两种粒度的流量重定向控制。通过对虚拟机引流的方式实现在传统场景中解决云计算环境下流量检测问题,同时能够基于OpenFlow轻松实现流量处理的扩展操作。 The virtual machines in cloud computing platform exchange data in the shared memory of physical machine.In view of the problem that the traffic cannot be captured and detected in firewall or other security components,the OpenFlow technology was analyzed,and a traffic redirection method based on OpenFlow was presented.To control traffic forwarding process and redirect it to security components,the method provided network connection for virtual machines with OpenFlow controller and virtual switches instead of physical switches,and built a traffic detection system composed of four modules including virtual switch,control unit,intrusion detection and system configuration management.The experimental results show that the proposed scheme can realize traffic redirection and the subsequent detection processing,and the system can provide switch-level and host-level control granularity.It also solves traffic detection problem under cloud computing environment in traditional scene by traffic redirection,and provides great expansion of the traffic processing based on OpenFlow.
出处 《计算机应用》 CSCD 北大核心 2014年第4期1034-1037,1041,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61272447) 国家2012年移动重大03专项(12H1510)
关键词 OpenFlow 虚拟机 流量重定向 流量检测 云计算 OpenFlow virtual machine traffic redirection traffic detection cloud computing
  • 相关文献

参考文献15

  • 1刘哲元,慕德俊.安全虚拟环境中的进程执行精确监控[J].西安电子科技大学学报,2012,39(6):181-186. 被引量:5
  • 2刘谦,王观海,翁楚良,等.一种虚拟机系统中关于多级安全的强制访问控制框架I:理论[J].中国通信,2010(4):137-143.
  • 3刘谦,王观海,翁楚良,骆源,李明禄.一种虚拟机系统下关于多级安全的强制访问控制框架Ⅱ:实现(英文)[J].China Communications,2011,8(2):86-94. 被引量:5
  • 4McKEOWN N, ANDERSON T, BALAKRISHNAN H, et al. Open- Flow: enabling innovation in campus networks [ J]. ACM SIG- COMM Computer Communication Review, 2008, 38(2) : 69 -74.
  • 5ELLIOTr C. GENI: opening up new classes of experiments in global networking [ J]. IEEE Intemet Computing, 2010, 14(1): 39 -42.
  • 6CHUN B, CULLER D, ROSCOE T, et al. PlanetLab: an overlay testbed for broad-coverage services [ J]. ACM SIGCOMM Computer Communication Review, 2003, 33(3) : 3 - 12.
  • 7GAVRAS A, KARILA A, FDIDA S, et al. Future Internet research and experimentation: the FIRE initiative [ J]. ACM SIGCOMM Computer Communication Review, 2007, 37(3) : 89 -92.
  • 8CoreLab Project. CoreLab home page [ EB/OL]. [ 2013-08-20]. http://www, corelab, ip/.
  • 9NAOUS J, ERICKSON D, COVINGTON G A, et al. Implemen- ting an OpenFlow switch on the NetFPGA platform [ C]//Proceed- ings of the 4th ACM/IEEE Symposium on Architectures for Networ- king and Communications Systems. New York: ACM, 2008:1 - 9.
  • 10左青云,陈鸣,赵广松,邢长友,张国敏,蒋培成.基于OpenFlow的SDN技术研究[J].软件学报,2013,24(5):1078-1097. 被引量:420

二级参考文献156

  • 1尹清波,张汝波,李雪耀,王慧强.基于动态马尔科夫模型的入侵检测技术研究[J].电子学报,2004,32(11):1785-1788. 被引量:9
  • 2尹清波,张汝波,李雪耀,王慧强.基于线性预测与马尔可夫模型的入侵检测技术研究[J].计算机学报,2005,28(5):900-907. 被引量:29
  • 3黄金钟,朱淼良,郭晔.基于文法的异常检测[J].浙江大学学报(工学版),2006,40(2):243-248. 被引量:3
  • 4冯力,孙杰,周晓明,杨力伟,彭勤科.基于Windows Native API序列的异常检测模型[J].西安交通大学学报,2006,40(4):406-410. 被引量:3
  • 5Information Security One (China) Ltd. Security service ideas and standard[EB/OL]. [2009-03-25]. http://bj.isone.net/safe/standard/P2DR/2008, 12.
  • 6ANDERSON J P. Computer security threat monitoring and surveillance[R]. USA, 1980.
  • 7DENNING D E. An intrusion detection model[J]. IEEE Transactions on Software Engineering, 1987, 13(2): 222-232.
  • 8CAULKINS D, LEE J, WANG M. Packet-vs. session-based modeling for intrusion detection systems[C]//Proc of the International Conference on Information Technology: Coding and Computing (ITCC 2005). Las Vegas, Nevada, USA: IEEE Computer Society, 2005: 80-87.
  • 9LEE W, STOLFO S J, CHAN P K. Learning patterns from Unix process execution traces for intrusion detection [C]//AAAI Workshop of AI Approaches to Fraud Detection and Risk Management. Menlo Park, CA: AAAI, 1997: 50-56.
  • 10LEE W, STOLFO S J. Data mining approaches for intrusion detection[C]//Proc of 7th USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 1998, 7: 6-16.

共引文献442

同被引文献31

  • 1刘谦,王观海,翁楚良,骆源,李明禄.一种虚拟机系统下关于多级安全的强制访问控制框架Ⅱ:实现(英文)[J].China Communications,2011,8(2):86-94. 被引量:5
  • 2ARMBRUST M, FOX A, GR1FFITH R, et al. A view of cloud computing [J]. Communications of the ACM, 2010, 53(4) : 50 - 58.
  • 3I,OCKWOOD J W, MOSCALA J, KULIG M. Internet worm and vi- rus protection in dynamically reconfigurable hardware[C l// Pro- ceedings of the 2003 ACM CCS Workshop on Rapid Malcode. NewYork: ACM, 2003:1 -8.
  • 4SU M. Using clustering to improve KNN-based classifie~ for online anomaly network traffic identificationl J]. Jom~al of Nctwm'k and Computer Applications, 2011, 34(2) : 722 - 730.
  • 5SHAH B, TRIVEDI H B. Artificial neural netwurk based intrasion detection system: a survey[ J]. International Journal of Compuler Applications, 2012, 39(6) : 13 - 18.
  • 6GUAN X, QIN T, LI W, et al. Dynamic feature analysis and meas- urement for large-scale network traltic monitoring l J I- IEEE Trans- actions on ln~brmatlon Forensics and Security, 2010, 5(4): 905 - 919.
  • 7刘谦,王观海,翁楚良,等.一种虚拟机系统中关于多级安全的强制访问控制框架I:理论[J].中国通信,2010(4):137-143.
  • 8DUNLAP G W, KING S T, CINAR S, et al. ReVirt: enal~ling in- trusion analysis through virtual-machine logging and replay[ C l// Proceedings of the 5th Symposium on Operating Systems Design and Imt~lementation. New York: ACM, 2002:211 -224.
  • 9辛毅,方滨兴,贺龙涛,云晓春,李志东.基于通信特征分析的蠕虫检测和特征提取方法的研究[J].通信学报,2007,28(12):1-7. 被引量:9
  • 10陈冬雨.思科开启“云”防火墙时代[J].计算机安全,2010(1):91-91. 被引量:2

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部