期刊文献+

建设IaaS模式的可信网站云平台 被引量:3

Building Trusted Website IaaS Cloud
下载PDF
导出
摘要 一直以来,运营商各个业务网站分散在各个地市分公司,因为安全投入不够,人员和技能不足,导致信息安全事件频发。因此,广东移动借鉴美国建设TIC可信互联网连接通道的思路,将地市分公司的分散出口进行整合关停,通过构建集约化网站保护安全云平台,统一利用双层异构防火墙、网络入侵保护、Web应用防火墙和负载均衡设备来组建强大的Iaa S资源池,通过创新的代理服务和访问控制来实现地市各个业务网站的按需接入云服务,并进行统一的安全运维,大大提升本省的网站安全形势。另外,借鉴了美国持续监控建设思路,云平台还提供漏洞扫描、网站监控等云服务,可以进行网站安全状态的持续监控,发现网站的漏洞、平稳度、篡改、挂马、非法内容等安全事件,并及时进行预警,对于建设私有云和公有云模式都是很好的安全借鉴。 For years, the business websites of telecom carriers, which are distributed at massive provincial subsidiaries in different regions, frequently exposes security issues due to inadequate investment in security and lack of security staffing and skills. Therefore, with reference to the constructing TIC(Trusted Internet Connections)in the USA, China Mobile Guangdong integrates and shut down some distributed egresses at the subsidiaries. It secures the security cloud platform by establishing an integrated website, and comprises a powerful laa S resource pool with powerful dual heterogeneous firewalls, intrusion protection systems, WAF(web application firewalls) and load balancers. Via the innovated application proxy services and access controls, it enables each business website located in different cities to have on-demand access to cloud services, with centralized security maintenance provided. These measures can significantly enhance the security postures of the websites located in Guangdong province. In addition, with reference to the continues monitoring(ISCM)in the USA, the cloud platform also provides vulnerability scanning, website monitoring and other cloud services for continuously monitoring of website security. It detects and alerts vulnerabilities, instability, defacement, malware injection, illegal contents and other security events. This can be a good reference for the construction of private cloud and public cloud modes.
出处 《计算机安全》 2014年第11期40-44,共5页 Network & Computer Security
关键词 云安全 安全云服务 TIC可信互联网连接 持续监控 Cloud Security Cloud Security services Trusted Internet Connections(TIC) Continuous Monitoring
  • 相关文献

参考文献3

  • 1Michael Daniel, Cross Agency Priority Goal: Cybersecurity(FY2015 Q4 Status Update), http://goais.perform&rice.g0V/node/59069,引用日期:2014.10.28.
  • 2Kelley Dempsey 等, Information Security Continuous Monitoring (ISCM) for Federal Information Sy Organizations, http://csrc.nist.gov/publ nistpubs/800 157/SP800-157 Final.pdf, SE 201 stems and ications/ PTEMBER.2011.
  • 3Clay Johnson Ⅲ, Implement&tion of Trusted Internet Connections (TIC), http://www.whitehouse.gov/sites/ default/files/omb/assets/omb/memoranda/fy2008/m08- 05. pdf, November 20, 2007.

同被引文献40

  • 1中国互联网信息中心.第36次中国互联网络发展状况统计报告[EB/OL].http://ww.cnnic.cn,20159.
  • 2国际电信联盟. 2014年信息与通信技术[EB/OL]. http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2014-e.pdf, 2014-05-08.
  • 3国家互联网应急中心. 互联网安全威胁报告[EB/OL]. http://www.cert.org.cn/publish/main/upload/File/2015 monthly08.pdf, 2015-08-10.
  • 4Wang Cong, Wang Qian, Ren Kui, et al. Toward secure and dependable storage services in cloud computing[J]. IEEE Transactions on Services Computing, 2012,5(2):220-232.
  • 5Shar L K, Tan H B K. Defeating SQL injection[J]. IEEE Computer Society, 2013,46(3):69-77.
  • 6W3C. Document Object Model(DOM)[EB/OL]. http://www.w3.org/DOM/, 2005-02-19.
  • 7Fonseca J, Seixas N, Vieira M, et al. Analysis of field data on Web security vulnerabilities[J]. IEEE Transactions on Dependable and Secure Computing, 2014,11(2):89-100.
  • 8吴润浦,方勇,吴少华.基于统计与代码特征分析的网页木马检测模型[J].信息与电子工程,2009,7(1):71-75. 被引量:15
  • 9徐鹏,林森.基于C4.5决策树的流量分类方法[J].软件学报,2009,20(10):2692-2704. 被引量:171
  • 10吴秋萍.云计算在电子政务系统中的应用研究[J].计算机与现代化,2011(7):116-120. 被引量:26

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部