ISSN 0253-2778

CN 34-1054/N

Open AccessOpen Access JUSTC

Research of security technology based on virtualization

Cite this:
https://doi.org/10.3969/j.issn.0253-2778.2011.10.011
  • Received Date: 28 April 2011
  • Rev Recd Date: 27 June 2011
  • Publish Date: 31 October 2011
  • A universal architecture based on Xen was presented, which had traditional security tools transplanted on it and in the meantime guarantees their functions, such as memory and file system scanning, and active defense. Since most components of the security tools are transplanted out of a protected virtual machine, the architecture provides higher security than traditional ones. Whats more, it uses paravirtuliation I/O technology to minimize the cost of the virtual machines. Finally, this architecture allows current security technologies based on virtual machines to be integrated into itself conveniently, with no need for the operation system and application running on it to be modified.
    A universal architecture based on Xen was presented, which had traditional security tools transplanted on it and in the meantime guarantees their functions, such as memory and file system scanning, and active defense. Since most components of the security tools are transplanted out of a protected virtual machine, the architecture provides higher security than traditional ones. Whats more, it uses paravirtuliation I/O technology to minimize the cost of the virtual machines. Finally, this architecture allows current security technologies based on virtual machines to be integrated into itself conveniently, with no need for the operation system and application running on it to be modified.
  • loading
  • 加载中

Catalog

    Article Metrics

    Article views (246) PDF downloads(98)
    Proportional views

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return