期刊文献+

面向大型企业信息安全建设的虚拟化威胁感知技术 被引量:5

Perception technology of virtual threat for large enterprise's information security construction
下载PDF
导出
摘要 面对信息化建设进程的快速推进,如何有效实现风险防控,建立先进实用、安全可靠的信息安全保障体系,是大型企业都要面临的严峻考验。分析了大型企业在信息化建设中面临的各种安全风险和信息安全防护工作的主要特性,提出了具有实践意义的信息安全防护体系建设思路。分析了大型企业信息安全建设虚拟化环境面临的威胁,设计出一种虚拟化安全威胁感知系统,该系统由威胁情报平台、本地检测系统和数据分析平台组成。 Facing with the rapid develop ment of the progress of the information construction, how to effectively achieve the risk prevention and control, in order to build the advanced, practical, safe and reliable information security system, is a severe test to every large enterprise. By analyzing the main characteristics of various security risks and the information security protection, which are faced by large enterprises in the information construction,the practical ideas for the construction of information security system was put forward. Furthermore, the threat that faced by the large enterprise's virtual environment of information security construction was analyzed, a virtual threat perception system was destgned, which consists of threat intelligence platform, the local detection system and data analysis platform.
出处 《电信科学》 北大核心 2016年第12期149-156,共8页 Telecommunications Science
关键词 信息安全 安全风险 安全防护 威胁感知 information security security risk security protection threat perception
  • 相关文献

参考文献1

二级参考文献13

  • 1MELL P, GRANCE T. The nist definition of cloud computing(draft)[J], NIST Special Publication, 2011, 800:145.
  • 2张亚勤,沈寓实,李雨航.沄计箨360度[M].北京:电子工业出版社,2013.
  • 3闽家信息技术服务标准工作组.中国云服务门皮书[R].北京:2013.
  • 4胡乐明,冯明,唐宏.云计筲安全技术与应用[M].北京:电子工业出版社,2012.
  • 5ARMBRUST M, FOX A, GRIFFITH R, et al. Above the Clouds: ABerkeley View of Cloud Compuling[R]. UCB/EECS-2009-28, EECSDepartment, University of California, Berkeley, 2009.
  • 6MURRAY D G, MILOS G, HAND S. Improving xen security throughdisaggregation[ A]. Proceedings of the Fourth ACM SIG-PLAN/SIGOPS International Conference on Virtual Execution Envi-ronments, ACM[C]. 2008.
  • 7HIRANO M, SHINAGAWA T, EIRAKU H, et al. Introducing role-based access control to a secure virtual machine monitor: security pol-icy enforcement mechanism for distributed computers[A]. Asia-PacificServices Computing Conference[C], 2008.2008.
  • 8KING S T, CHEN P M. Backtracking intrusions[J]. ACM Transactionson Computer Systems (TOCS), 2005, 23(1):51-76.
  • 9PAYNE B D, CARBONE M, SHARIF M, et al. An architecture forsecure active monitoring using virtualization[A], Proceedings of theIEEE Symposium on Security and Privacy[C]. 2008.
  • 10SHARIF M, LEE W, CUI W,et al. Secure In-VM monitoring usinghardware virtualizalion[A]. 16th ACM Conference on Computer andCommunications Security. ACM[C]. 2009.

共引文献5

同被引文献22

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部