期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
基于虚拟化的系统安全增强及显卡透传研究 被引量:3
1
作者 侯建宁 董贵山 +1 位作者 王银 申娅 《计算机工程》 CAS CSCD 2012年第8期224-227,231,共5页
针对个人终端操作系统安全问题,提出一种基于系统虚拟化技术的操作系统安全增强模型,研究提高该模型下KVM虚拟机显示性能的显卡透传技术。实验结果表明,显卡透传技术能够克服虚拟机客户操作系统的显示性能缺陷,使得客户机操作系统能够... 针对个人终端操作系统安全问题,提出一种基于系统虚拟化技术的操作系统安全增强模型,研究提高该模型下KVM虚拟机显示性能的显卡透传技术。实验结果表明,显卡透传技术能够克服虚拟机客户操作系统的显示性能缺陷,使得客户机操作系统能够像真实操作系统一样满足图形显示与处理的应用,适用于终端安全领域。 展开更多
关键词 系统虚拟化技术 系统安全增强 KVM虚拟 显卡透传 直接地址映射 PCI配置空间
下载PDF
操作系统级虚拟化技术在网络教学环境中的应用
2
作者 关志芳 任志伟 《信息通信》 2015年第11期172-,共1页
自工业革命以来,社会科技得以迅猛发展,并在很大程度上颠覆了人们传统的生活方式,使人们对世界、对生活全都有了新的改观和定义。计算机技术作为在社会科技发展之下的一项重大成果,已经广泛应用到各个领域。文章将立足于操作系统级虚拟... 自工业革命以来,社会科技得以迅猛发展,并在很大程度上颠覆了人们传统的生活方式,使人们对世界、对生活全都有了新的改观和定义。计算机技术作为在社会科技发展之下的一项重大成果,已经广泛应用到各个领域。文章将立足于操作系统级虚拟化技术在网络教学环境中的应用现状,分析网络教学环境目前的缺陷,从而提出相关的应对方案。 展开更多
关键词 操作系统虚拟技术 网络教学环境 实际应用
下载PDF
工业控制网络系统安全防护的思考 被引量:6
3
作者 李小强 陈涤新 《制造业自动化》 CSCD 2017年第6期140-144,共5页
工业控制网络系统的安全问题日益突出,目前所提出的各种解决方案,都存在一个共性问题,就是不能满足工业控制网络的可用性要求。从网络安全性、可靠性、可用性方面进行分析,提出采用终端集中管控技术和安全白名单技术的防御性安全策略来... 工业控制网络系统的安全问题日益突出,目前所提出的各种解决方案,都存在一个共性问题,就是不能满足工业控制网络的可用性要求。从网络安全性、可靠性、可用性方面进行分析,提出采用终端集中管控技术和安全白名单技术的防御性安全策略来解决工业控制网络的安全问题的方法。 展开更多
关键词 工业控制网络 系统信息安全白名单技术虚拟技术
下载PDF
一种基于隐藏事件触发机制的内存取证方法 被引量:5
4
作者 崔超远 李勇钢 +1 位作者 乌云 王励成 《计算机研究与发展》 EI CSCD 北大核心 2018年第10期2278-2290,共13页
内存取证是计算机取证科学的重要分支,能够提取和分析操作系统运行状态的数字证据,已经成为对抗网络犯罪的有力武器.现有内存取证方法大多是全面获取内存数据,因而包含大量冗余信息,为后续内存分析带来不便.此外,在取证时间点选取方面... 内存取证是计算机取证科学的重要分支,能够提取和分析操作系统运行状态的数字证据,已经成为对抗网络犯罪的有力武器.现有内存取证方法大多是全面获取内存数据,因而包含大量冗余信息,为后续内存分析带来不便.此外,在取证时间点选取方面存在盲目性,尤其是对具有隐藏特性的恶意软件,无法准确地在攻击发生时进行实时取证.由于内存具有易失性和不可恢复性的特点,取证时间点与攻击过程不匹配将使得取证内容无法表征攻击行为,导致取证数据无效.针对以上问题,提出一种基于隐藏事件触发机制的内存取证方法 ForenHD.该方法利用虚拟化技术实时监视目标虚拟机中的内核对象,并通过分析内核对象的逻辑连接关系和运行状态的变化来检测隐藏对象;然后以隐藏对象的发现作为内存取证的触发事件,通过内存映射提取隐藏对象的代码段信息,实现实时和局部内存取证.通过对多种隐藏对象取证的实验,证明了ForenHD的可行性和有效性. 展开更多
关键词 内存取证 实时取证 局部取证 隐藏事件 触发机制 系统虚拟化技术
下载PDF
SDSA: A Framework of a Software-Defi ned Security Architecture 被引量:3
5
作者 LIU Yanbing LU Xingyu +1 位作者 JIAN Yi XIAO Yunpeng 《China Communications》 SCIE CSCD 2016年第2期178-188,共11页
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou... The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems. 展开更多
关键词 information security networksecurity security architecture software-definedsecurity
下载PDF
The Research on Knowledge Sharing in the Small and Medium-sized Enterprise based on Cloud Computing
6
作者 Jichao Hu Xiangwen Yang 《International Journal of Technology Management》 2014年第8期112-114,共3页
The paper combine cloud computing with knowledge management, and classify the knowledge management of enterprise information management system, finally the paper plan and design the overall architecture of enterprise ... The paper combine cloud computing with knowledge management, and classify the knowledge management of enterprise information management system, finally the paper plan and design the overall architecture of enterprise management information system. According to the model of cloud computing, establish the cloud computing platform based on the construction of cloud computing and virtualization technology, in order to achieve the overall architecture of the management information system of enterprise that migrate to the cloud computing enviromlaent. This paper mainly introduced in the cloud computing architecture of enterprise management information system under the environment of cloud computing and implementation of knowledge management system. 展开更多
关键词 Knowledge management cloud computing core data security model
下载PDF
CAPT:Context-Aware Provenance Tracing for Attack Investigation
7
作者 Cheng Tan Lei Zhao +2 位作者 Weijie Liu Lai Xu Lina Wang 《China Communications》 SCIE CSCD 2018年第2期153-169,共17页
APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an ... APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an important approach to attack investigation, as it discloses the root cause, the attacking path, and the results of attacks. However, existing techniques either suffer from the limitation of only focusing on the log type, or are high- ly susceptible to attacks, which hinder their applications in investigating APT attacks. We present CAPT, a context-aware provenance tracing system that leverages the advantages of virtualization technologies to transparently collect system events and network events out of the target machine, and processes them in the specific host which introduces no space cost to the target. CAPT utilizes the contexts of collected events to bridge the gap between them, and provides a panoramic view to the attack investigation. Our evaluation results show that CAPT achieves the efi'ective prov- enance tracing to the attack cases, and it only produces 0.21 MB overhead in 8 hours. With our newly-developed technology, we keep the run-time overhead averages less than 4%. 展开更多
关键词 attack investigation provenance tracing CONTEXT-AWARE virtualization technol-ogies APT attacks panoramic view
下载PDF
OPKH: A Lightweight Online Approach to Protecting Kernel Hooks in Kernel Modules
8
作者 田东海 李轩涯 +1 位作者 胡昌振 闫怀志 《China Communications》 SCIE CSCD 2013年第11期15-23,共9页
Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in t... Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in that: 1) some methods require modifying the source code of OS kernel and kernel modules, which is less practical for wide deployment; 2) other methods cannot well protect the kernel hooks and function return addresses inside kernel mo- dules whose memory locations cannot be pre- determined. To address these problems, we propose OPKH, an on-the-fly hook protection system based on the virtualization technology. Compared with previous solutions, OPKH off- ers the protected OS a fully transparent envi- ronment and an easy deployment. In general, the working procedure of OPKH can be di- vided into two steps. First, we utilise the me- mory virtualization for offiine profiling so that the dynamic hooks can be identified. Second, we exploit the online patching technique to in- strument the hooks for run-time protection. The experiments show that our system can pro- tect the dynamic hooks effectively with mini- mal performance overhead. 展开更多
关键词 kernel hook virtualization tech-nology online patching
下载PDF
A Practical Online Approach to Protecting Kernel Heap Buffers in Kernel Modules
9
作者 Donghai Tian Xiaoqi Jia +2 位作者 Junhua Chen Changzhen Hu Jingfeng Xue 《China Communications》 SCIE CSCD 2016年第11期143-152,共10页
Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing met... Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing methods focus on user-level heap overflow detection. Only a few methods are proposed for kernel heap protection. Moreover,all these kernel protection methods need modifying the existing OS kernel so that they may not be adopted in practice. To address this problem,we propose a lightweight virtualization-based solution that can protect the kernel heap buffers allocated for the target kernel modules. The key idea of our approach is to combine the static binary analysis and virtualization technology to trap a memory allocation operation of the target kernel module,and then add one secure canary word to the end of the allocated buffer. After that,a monitor process is launched to check the integrity of the canaries. The evaluations show that our system can detect kernel heap overflow attacks effectively with minimal performance cost. 展开更多
关键词 kernel heap overflow virtualization technology kernel module
全文增补中
上一页 1 下一页 到第
使用帮助 返回顶部