期刊文献+

面向虚拟桌面内外部数据流的安全控制机制研究 被引量:2

Secure Control Mechanism of Internal and External Data-flow Oriented to Virtual-desktop
下载PDF
导出
摘要 桌面虚拟化需要借助虚拟桌面协议来实现内部应用数据和外部操作平台的数据交互。然而该类协议中的数据流控制机制并不完善,存在数据非法交互的安全隐患。为解决该问题,基于网关模式提出了一种面向虚拟桌面内外部数据流的安全控制机制SCIED。它不仅能对协议中的虚拟通道进行全面管控,避免修改协议和大量的终端,还具有较高的兼容性、拓展性。将它部署于网关并用于防护边界攻击,能显著减少服务器端的负载和安全隐患。实验表明,该SCIED能够有效保证数据流的安全交互,并且对现有桌面会话的性能影响较小。 The data interaction of desktop virtualization between internal application data and external user operation platform are realized by virtual desktop protocol. Because of the deficiency of the data flow control mechanism in this kind of protocol, it may lead to the illegal interaction. In order to resolve this problem, based on gateway, this paper pro- posed a secure control mechanism of internal and external data-flow oriented to virtual-desktop. It not only has the over- all control of virtual channel, avoiding modifying lots of transport protocols or terminals, but also has high compatibilities, expansibilities and usability. Deploying it at the gateway to protect from boundaries attack can reduce the server load and safety concerns significantly. Experiments prove that this mechanism can control the direction of data flow elfectively. Meanwhile, it has little impact on existing desktop session.
出处 《计算机科学》 CSCD 北大核心 2016年第4期122-126,共5页 Computer Science
基金 中国铁路总公司科技研究开发计划重大课题(2013X010-A)资助
关键词 桌面虚拟化 虚拟桌面协议 安全控制机制 内外部数据流 Desktop virtualization,Virtual desktop protocol, Secure control mechanism, Internal and external dataflow
  • 相关文献

参考文献3

二级参考文献49

  • 1Goldberg R P. Architectural Principles for Virtual Computer Systems [ D]. Cambridge:Harvard University, 1972 : 1-5.
  • 2Adams K, Agesen O. A comparison of software and hardware techniques for X86 virtualization[ C]// Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems. New York.. ACM, 2006:2-13.
  • 3Huang Y, Stavrou A, Ghosh A K, et al. Efficiently tracking application interactions using lightweight virtualization[C]// Proceedings of the 1st ACM Workshop on Virtual Machine Security. New York.. ACM, 2008 : 19-28.
  • 4Isolated Execution. [2008-11-21]. http://isolate& exec. sourceforge, net.
  • 5Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization[C]//Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. New York: ACM, 2003:164-177.
  • 6Pratt. Xen 3. 0 and the art of virtualization[C]// Proceedings of the Ottawa Linux Symposium. Ottawa: 2005 Linux Symposium, 2005:65-78.
  • 7Garfinkel T, Pfaff B, Chow J, et al. A virtual machine-based platform for trusted eomputing [C]// Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. New York: ACM, 2003 : 193-206.
  • 8OpenTC. [2005-11-15]. http://www, opente, net.
  • 9Garfinkel T, Rosenblum M. A virtual machine introspection based architecture for intrusion detection [C] //Proceedings of the Internet Society's 10th Symposium on Network and Distributed System Security. San Diego: ISOC, 2003:1-16.
  • 10Payne B D, Carbone M, Lee W. Secure and flexible monitoring of virtual machines [C]// Proceedings of 23rd Annual Computer Security Applications. Washington, DC.. IEEE Computer Soc, 2007 : 385-397.

共引文献22

同被引文献25

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部