期刊文献+

一种基于OpenvSwitch的虚拟机安全防护方案 被引量:2

A Safety Protection Scheme of the Virtual Machine Based on Openv Switch
下载PDF
导出
摘要 针对虚拟网络安全边界不清晰,传统的网络设备无法监控虚拟机间的数据流量等问题,提出了一种虚拟网络安全防护方案。该方案基于OpenvSwitch技术,实现了虚拟机之间的访问控制、安全域划分策略、安全域间访问控制、虚拟机准入控制以及网络功能划分功能,有效地加强了虚拟网络边界,检测和控制网络访问。经部署和测试,说明方案的可行性与合理性。 Aiming at the problems that there are undefined boundary in virtual network and the inability of traditional network equipment in monitoring or controlling the data flow between virtual machines,the paper proposes a scheme to protect the virtual network. Based on the technique of Openv Switch,the scheme realizes the access control between virtual machines,the partitioning strategy of security domain,the access control between security domains,the admission control of virtual machine and the division of network functional,and reinforcing the boundary of virtual network efficiently,detecting and the network controll access. The scheme proves to be feasible and rational after deploying and testing.
出处 《北京电子科技学院学报》 2015年第4期38-43,共6页 Journal of Beijing Electronic Science And Technology Institute
基金 "中央高校基本科研业务费资助(项目编号:328201537)"
关键词 网络安全 OpenvSwitch 访问控制 安全域 Network security OpenvSwitch Access control Security domain
  • 相关文献

参考文献6

二级参考文献20

  • 1周建峰,马玉祥,欧阳雄.PKI信任模型研究[J].电子科技,2006,19(4):75-78. 被引量:7
  • 2肖政,韩英,叶蓬,侯紫峰.基于可信计算平台的体系结构研究与应用[J].计算机应用,2006,26(8):1807-1809. 被引量:23
  • 3Denning D E. An intrusion detection model[ J ]. IEEE Transaction on Software Engineering, 1987, 13 (2):222- 232.
  • 4Rosenblum, M Garfinkel. Virtual machine monitors: Current technology and future trends[ J ]. IEEE Computer, 2005,38 (5) : 3947.
  • 5Paul Barham, Boris Dragovic, Keir Fraser. Xen and the Art of Virtualization[ J]. The nineteenth ACM symposium on Operating Systems principles,2003,15(3) : 164 - 177.
  • 6Garfinkel T, Pfaff B, Chow J. A virtual machine- based plafform for trusted computing[J]. Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003, ( 1 ) : 69 - 75.
  • 7Laureano M, Maziero C, Jamhottr E. Protecting host- based intrusion detectors through virtual machines [ J ]. Computer Networks, 2007,3(7) : 1275 - 1283.
  • 8ENGLAND P, LAMPSON B, MANFERDELLI J,et al. A trusted open platform[J]. IEEE Computer Society, 2003, 36(7):55-62.
  • 9TA-MIN R, LITTY L, LIE D. Splitting interfaces: making trust between applications and operating systems configurable [C]//Proceedings of the 7th Symposium on Operating Systems Design and Implementation.Berkeley: USENIX Association, 2006: 279-292.
  • 10LIE D, THEKKATH C, Mitchell M. Architectural support for copy and tamper resistant software [C]//Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems.New York: ACM Press, 2000: 168-177.

共引文献17

同被引文献23

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部