期刊文献+

一种基于扇区读写时校验的虚拟机镜像保护方法

原文传递
导出
摘要 本文阐述了一种对虚拟机镜像读写过程中按扇区进行校验的方法,可有效防止虚拟机镜像及虚拟磁盘数据篡改攻击。该方法在虚拟机运行时写数据过程中按扇区更新扇区校验值、读数据时按扇区进行校验检查,达到检查整个镜像是否被篡改的目的,避免脏数据影响虚拟机安全。本方法可以有效减少虚拟机启动前对镜像文件的校验检查时间,对镜像文件的篡改发现时间推迟到读取被篡改的扇区时,仍可有效保证虚拟机的安全。
出处 《网络安全技术与应用》 2024年第9期80-82,共3页 Network Security Technology & Application
  • 相关文献

参考文献1

二级参考文献40

  • 1BINU A,KUMAR G S.Virtualization techniques:a methodical reviewof Xen and KVM[C]//Proc of the 1st International Conference onAdvances in Computing and Communications.Berlin:Springer-Verlag,2011:399-410.
  • 2WANG Xi,CHENG Chuan.Access control using trusted virtual ma-chine based on Xen[C]//Proc of International Conference on AppliedInformatics and Communication.Berlin:Springer-Verlag,2011:94-101.
  • 3SALAUN M.Practical overview of a Xen covert channel[J].Journalin Computer Virology,2010,6(4):317-328.
  • 4PRICE M.The paradox of security in virtual environments[J].Com-puter,2008,41(11):22-28.
  • 5IDC.New IDC IT cloud services survey:top benefits and challenges[EB/OL].(2009-11-15).http://blogs.idc.com/ie/?p=730.
  • 6BARHAM P,DRAGOVIC B,FRASER S,et al.Xen and the art ofvirtualization[C]//Proc of the 19th ACM Symposium on OperatingSystems Principles.New York:ACM Press,2003:164-177.
  • 7ZHANG Xiao-tao,DONG Yao-zu.Optimizing Xen VMM based on In-telvirtualization technology[C]//Proc of International Conferenceon Internet Computing in Science and Engineering.Washington DC:IEEE Computer Society,2008:367-374.
  • 8BRATUS S,LOCASTO M E,RAMASWAMY A,et al.Traps,events,emulation,and enforcement:managing the Yin and Yang of virtualiza-tion-based security[C]//Proc of the 1st ACM Workshop on VirtualMachine Security.New York:ACM Press,2008:49-58.
  • 9LIU Dong-xi,LEE J,JANG Ju-lian,et al.A cloud architecture of vir-tual trusted platform modules[C]//Proc of IEEE/IFIP InternationalConference on Embedded and Ubiquitous Computing.WashingtonDC:IEEE Computer Society,2010:804-811.
  • 10ALSHAWABKEH M,MOFFIE M,AZMANDIAN F,et al.Effectivevirtual machine monitor intrusion detection using feature selection onhighly imbalanced data[C]//Proc of the 9th International Conferenceon Machine Learning and Applications.Washington DC:IEEE Com-puter Society,2010:823-827.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部