期刊文献+

基于虚拟节点管理的云安全漏洞扫描系统 被引量:8

Cloud Security Vulnerability Scanning System Based on Distributed Virtual Nodes Management
下载PDF
导出
摘要 安全漏洞问题是众多的云安全问题中非常重要的一部分。目前针对网络安全漏洞扫描的软件或者系统不能够很好的适用于云计算网络,而为了满足在云环境下的分布式漏洞扫描需求,需要实现对多扫描节点的全面管理,所以给出了一种基于分布式虚拟节点管理的云安全漏洞扫描系统研究方案,通过分析扫描节点的生命周期和基于此生命周期的扫描节点工作流,着重设计了虚拟扫描节点在其生命周期各阶段的管理策略,并接受管理平台的即时监控。该方案能够根据不同的任务调度策略合理分配扫描任务以及快速检测异常扫描节点,从而实现任务合理迁移和扫描节点的回收。 Security vulnerabilities are very important parts of cloud security issues.However,the systems for network vulnerability scanning are currently not well suited for cloud computing network.In order to meet the needs of distributed vulnerability scanning in a cloud environment,it is necessary to achieve the overall management of the multi-scanning nodes.So a research scheme for the cloud security vulnerability scanning system based on distributed virtual nodes management was proposed.The method analyzes the life cycle of the scanning nodes and the work flow based on it.It focuses on the design of virtual nodes management strategies at each stage of its life cycle and accepts the real-time monitoring from management platform.Thus,the proposed scheme could provide rational allocation of scanning tasks and quick detection of abnormal scanning nodes depending on different task scheduling strategies,and also could realize the rational move of scanning tasks and the retrieve of scanning nodes.
作者 廖金菊 冯光辉 LIAO Jin-ju FENG Guang-hui(School of Information Engineering, Zhengzhou University of Industrial Technology, Zhengzhou 451150, China)
出处 《中国电子科学研究院学报》 北大核心 2016年第5期483-489,共7页 Journal of China Academy of Electronics and Information Technology
基金 河南省科技厅发展计划(142102110088)
关键词 云安全 漏洞扫描 虚拟节点管理 分布式 cloud security vulnerability scanning virtual nodes management distributed
  • 相关文献

参考文献5

二级参考文献72

  • 1侯雨桥,屈宇,刘林峰,郑庆华,刘烃,郑超,杨子江.基于调用结构的软件可生存性评估方法[J].中南大学学报(自然科学版),2013,44(S1):443-448. 被引量:1
  • 2刘嫔,唐朝京,张森强.基于网络的安全漏洞分类与扫描分析[J].信息与电子工程,2004,2(4):318-320. 被引量:5
  • 3肖晖,张玉清.Nessus插件开发及实例[J].计算机工程,2007,33(2):241-243. 被引量:9
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 6Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 7Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 8Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 9Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].

共引文献1079

同被引文献47

引证文献8

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部