期刊文献+

支持多种虚拟化技术的进程非代理监控方法 被引量:5

Agent-free processes monitoring method supporting various virtualization technologies
原文传递
导出
摘要 为保障云环境中虚拟机应用的安全性与可用性,提出一种能够支持多种虚拟化技术的进程非代理监控方法及主动监控框架.本框架将进程监控点设在虚拟机监视器中,而不在其中安装任何代理,并且支持VMware,Xen和KVM三种虚拟化技术,实现了对客户操作系统(Guest OS)的隐藏进程检测和进程负载监控,保证虚拟机安全可靠地运行.从被监控虚拟机外部获取活动进程链、遍历线程获得进程列表,进而利用交叉视图技术可检测出隐藏进程;除开活动进程链,加上网络连接信息相关的另两条链表,从中定位到待监控进程,可获得进程负载状况.实验结果表明:本框架能有效地检测出系统中的隐藏进程,并且准确获取特定进程的负载信息. For the security and availability of applications in virtual machines in the cloud environ-ment ,an agent-free processes monitoring method was proposed ,which can support various virtualiza-tion technologies and a monitoring framework .The monitoring points of the framework were located outside the virtual machine to be monitored ,and no agent was involved in .Our framework can sup-port three virtualization technologies of VMware ,Xen and KVM ,and realizes the hidden processes detection and process load monitoring of the Guest OS to ensure the virtual machine ’s security and re-liability .Active process chain was got from outside the virtual machine to be monitored ,and thread was traversed to get the list of processes .Thus taking advantage of the cross-view technology ,a hid-den process can be found .Except for the active processes chain ,two linked lists related to network connection information can be added to obtain process loading information . After positioning the process from the lists ,the process load conditions can be got .The experimental results show that the proposed framework can detect hidden processes effectively and efficiently ,and obtain the specific process load information accurately .
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第11期121-127,共7页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60970114 41104010)
关键词 进程监控 虚拟机监视器 非代理 隐藏进程 进程负载 processes monitoring virtual machine monitor agent-free hidden processes process loading
  • 相关文献

参考文献4

二级参考文献10

  • 1唐勇,卢锡城,胡华平,朱培栋.Honeypot技术及其应用研究综述[J].小型微型计算机系统,2007,28(8):1345-1351. 被引量:9
  • 2怀进鹏,李沁,胡春明.基于虚拟机的虚拟计算环境研究与设计[J].软件学报,2007,18(8):2016-2026. 被引量:78
  • 3Thimbleby H,Anderson S,Cairns P.A Framework for Modeling Trojans and Computer Virus Infections.The Computer Journal,1998,41(7):444~458
  • 4Buteler J R Ⅱ.Detecting Compromises of Core Subsystems and Kernel Functions in Windows NT/2000/XP:M.S.Thesis,University of Maryland,Baltimore County,2002
  • 5Butler J,Jeffrey L.Undercoffer and John Pinkston.Hidden Processes:The Implication for Intrusion Detection.In:Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy,West Point,NY,June 2003
  • 6Levine J G,Grizzard J B,Hutto P W,Owen H L.A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call Table.In:Proceedings of IEEE.SoutheastCon,IEEE,2004.25~31
  • 7Levine J,Grizzard J,Owen H.A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.In:Second IEEE International Information Assurance Workshop,2004
  • 8杨震宇,邓晓衡.操作系统日志的行为挖掘与模式识别[J].电脑与信息技术,2010,18(1):53-55. 被引量:3
  • 9吴佳民,彭新光,高丹.基于Xen虚拟机的系统日志安全研究[J].计算机应用与软件,2010,27(4):125-126. 被引量:3
  • 10连一峰.入侵检测综述(二)[J].网络安全技术与应用,2003(2):43-45. 被引量:3

共引文献88

同被引文献63

  • 1冯少冲,邸彦强,朱元昌,杨文兵.IaaS云计算中虚拟机部署算法研究[J].华中科技大学学报(自然科学版),2012,40(S1):359-364. 被引量:4
  • 2李之棠,徐晓丹.动态蜜罐技术分析与设计[J].华中科技大学学报(自然科学版),2005,33(2):86-88. 被引量:19
  • 3沈昌祥.云计算安全与等级保护[A].第6届内网安全技术论坛专题斗言息安全与通信保密[c].2012.
  • 4Aceto G,Botta A,de Donato W,et al.Cloud monitoring:a survey[J].Computer Networks,2013,57(9):2093-2115.
  • 5Boulon J,Konwinski A,Qi R,et al.Chukwa,a large-scale monitoring system[C]∥Proceedings of the 24th International Conference on Large Installation System Administration.Chicago:ACM,2008:1-5.
  • 6Litty L,Lagar-Cavilla H A,Lie D.Computer meteorology:monitoring compute clouds[C]∥Proceedings of the 12th Conference on Hot Topics in Operating Systems(HotOS'09).Berkeley:USENIX Association,2009:4-4.
  • 7Park J S,Yu H C,Chung K S,et al.Markov chain based monitoring service for fault tolerance in mobile cloud computing[C]∥Proceedings of 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.Biopolis:ACM,2011:520-525.
  • 8Zou Deqing,Zhang Wenrong,Qiang Weizhong,et al.Design and implementation of a trusted monitoring framework for cloud platforms[J].Future Generation Computer Systems,2013,29(8):2092-2102.
  • 9Tian Wenhong,Sun Xiashuan,Cao Jun,et al.CloudMoni:a monitoring framework for on demand virtual machine allocation in cloud data centers[J].Journal of Information and Computational Science,2013,10(4):4639-4646.
  • 10Chen Huacai,Jin Hai,Hu Kan,et al.Scheduling overcommitted VM:behavior monitoring and dynamic switching-frequency scaling[J].Future Generation Computer Systems,2013,29(1):341-351.

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部