期刊文献+

面向虚拟化环境的网络访问控制系统 被引量:4

A Network Access Control System in Virtualized Environments
下载PDF
导出
摘要 网络访问控制技术是保障网络通信系统安全的主要技术之一,在传统数据中心、园区网和企业网得到普遍应用。虚拟化环境下,传统的基于交换机物理端口的网络访问控制技术很难对虚拟机网络访问进行有效控制。文章全面分析了虚拟化环境下导致传统网络访问控制技术失效的原因,并据此提出了面向虚拟化环境的网络访问控制系统框架VE-NAC,设计了适用于虚拟化环境的网络访问控制流程。该框架与802.1x协议兼容,不需要对认证客户端进行修改。文章在openstack虚拟化环境下对VE-NAC予以实现,并对VE-NAC原型系统进行了功能测试和延迟测试,验证了VE-NAC在虚拟化环境中实施网络访问控制的有效性和可行性。 Network access control technology is one of the main technologies to ensure the security of network communication systems.It is widely used in traditional data centers,campus networks and enterprise networks.However,in virtualized environment,traditional port-based network access control(PNAC)is difficult to effectively control virtual machine network access.This paper comprehensively analyzes the reasons of the failure of traditional network access control technology in virtualized environment,develops a network access control framework VE-NAC for virtualized environment,and designs the network access control process suitable for virtualized environment.VE-NAC is compatible with 802.1x protocol and does not need to modify the authentication client.This paper implements VE-NAC in openstack virtualization environment,and tests the functions and delay of VE-NAC prototype system,which verifies the validity and feasibility of VE-NAC implementing network access control in virtualization environment.
作者 时向泉 陶静 赵宝康 SHI Xiangquan;TAO Jing;ZHAO Baokang(College of Computer,National University of Defense Technology,Changsha Hunan 410073,China)
出处 《信息网络安全》 CSCD 北大核心 2019年第10期1-9,共9页 Netinfo Security
基金 国家自然科学基金[61601483] 国家重点研发计划[2017YFB0802300]
关键词 虚拟化环境 SDN OpenFlow 网络访问控制 virtualized environment SDN OpenFlow network access control
  • 相关文献

参考文献2

二级参考文献103

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 5Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 6Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 7Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 8Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 9Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].

共引文献1336

同被引文献15

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部