期刊文献+

虚拟机自省技术研究 被引量:3

Research on Virtual Machine Introspection Technology
下载PDF
导出
摘要 虚拟机自省是从虚拟机外部获取客户虚拟机操作系统内部状态信息的技术,该技术打破了传统安全防护技术的瓶颈,受到了安全领域的广泛关注。近年来,该技术已经在入侵检测、恶意软件分析、数字取证等领域得到应用,尤其是针对日益凸显的云安全问题,具有极好的应用前景。文章深入分析了VMI技术的实现原理和发展历史,提出了一种新的VMI技术分类方法,并研究了VMI技术的应用情况,分析提出了VMI技术存在的问题和未来发展方向。 Virtual machine introspection is the technology that takes the internal information of the guest OS from the external of the virtual machine. It overcomes the bottleneck of traditional security technology and therefore is widely concerned by the security field. In recent years, it has been applied in the intrusion detection, malware analysis, digital forensics etc. Especially, it has excellent application prospects in the increasingly prominent cloud security issues. This paper analyzes the realization principle and development history of VMI technology. According the above researches, this paper proposes a new VMI technology classification method and study application of VMI technology. In the final part, this paper analyzes and put forward the existing problems and future development direction of VMI technology.
出处 《信息网络安全》 CSCD 2017年第9期63-68,共6页 Netinfo Security
基金 国家重点研发计划[2016YFB0800805] 天津市科技服务业科技重大专项[16ZXFWGX00140] 中国民航大学信息安全测评中心开放基金课题[CAAC-ISECCA-201501]
关键词 虚拟机 云安全 虚拟机自省 操作系统 virtual machine cloud security virtual machine introspection OS
  • 相关文献

参考文献7

二级参考文献68

  • 1刘传,薛质.基于LINUX VFS的后门机制分析与实现[J].信息安全与通信保密,2006,28(11):137-139. 被引量:2
  • 2英特尔开源软件技术中心,复旦大学并行处理研究所.系统虚拟化:原理与实现[M].北京:清华大学出版社,2009.
  • 3广小明,胡杰,陈龙,等.虚拟化技术原理与实现[M].北京:电子工业出版社,2012.
  • 4GARFINKEL T, ROSENBLUM M. A virtual machine introspection based architecture for intrusion detection[A].Network and Distributed System Security Symposium [C],2003.
  • 5JIANG X, WANG X, XU D. Stealthy malware detection through VMM-based "out-of-the-box" semantic view reconstruction[A]. Computer and Communication Security[C]. New York, USA, 2007. 128-138.
  • 6JIANG X, WANG X. Out-of-the-box monitoring of VM-based high-interaction honeypots[A]. Recent Advances in Intrusion Detec- tion[C]. Australia, 2007. 198-218.
  • 7HAY B, NANCE K. Forensics examination of volatile system data using virtual introspection[J]. ACM Sigops OS Review, 2008, 42(3): 74-82.
  • 8DOLAN-G B, PAYNE B, LEE W. Leveraging forensic tools for virtual machine inlrospection[R]. GT-CS-11-05, 2011.
  • 9CHEN P M, NOBLE B. When virtual is better than real[J]. Hot Topics in Operating Systems (HOTOS '01), 2001, 8:133-138.
  • 10JONES S T, ARPACI D, A C, ARPACI D, R H. Antfarm: tracking processes in a virtual machine environment[A]. Proc of the 2006 USENIX Annual Technical Conference[C]. 2006.

共引文献42

同被引文献10

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部