期刊文献+

基于Xen虚拟机的密罐系统设计 被引量:2

A Design of Honeypot Based on Xen Virtual Machine
原文传递
导出
摘要 作为主动安全防御重要工具的密罐系统,发现和破坏它的技术和方法正不断出现。文章运用Xen虚拟技术,结合密罐的系统结构,使密罐系统具有更高的隐匿性,更易于管理和使用。 The methods and techniques to detect and compromise Honeypot are deployed more and more widely. To improve Honeypot system, this paper proposes build the Honeypot based on Xen virtual machine technology to make Honeypot more effective in performance, more difficult to detect and easier to manage and use.
出处 《信息安全与通信保密》 2007年第7期84-86,共3页 Information Security and Communications Privacy
关键词 密罐 虚拟机 XEN honeypot virtual machine Xen
  • 相关文献

参考文献7

  • 1[1]Corey J.Local honeypot Identification[EB/OL].http://phrack.nl/phrack62/p62-0x07.txt,2004. 被引量:1
  • 2[2]Corey J.Advanced Honeypot Identification and Exploitation[EB/OL].http://www.phrack.org/fakes/p63/p63-0x09.txt,2004. 被引量:1
  • 3[3]Jiang Xuxian,Xu Dongyan,Wang Yimin.Collapsar:A VM-Based Honeyfarm and Reverse Honeyfarm Architecture for Network Atrack Capture and Detention[J].Journal of Parallel and Distributed Computing,Special Issue on Security In Grid and Distributed Systems,2006,66(9):1165-1180. 被引量:1
  • 4[4]Vrable M,Ma J,Chen J,et al.Scalability,Fidelity,and Containment in the Potemkin Virtual Honeyfarm[A].ACM SIGOPS Operating Systems Review[C].New York:ACM Press,2005:148-162. 被引量:1
  • 5[5]Daniela A S,Jedidiah R,Wassermann G,et al.VM-Based Full-System Replay for Attack Analysis and System Recovery[A].Architectural SuppoA for Programming Languages and Operating Systems[C].California San Jose,2006:66-71. 被引量:1
  • 6[6]Barham P,Dragovic B,Fraser K,et al.Xen and the Art of Virtualization[A].A CM Symposium on Operating Systems Principles[C].A CM Press:New York.2003:164-177. 被引量:1
  • 7[7]Xen 3.0 user manuls[EB/OL].http://www.cl.cam.ac.uk/research/srg/netos/xen/readmes/user.pdf,2005:26-27. 被引量:1

同被引文献13

  • 1徐小龙,王汝传.基于虚拟机的分布式欺骗攻击技术的研究和实现[J].信息安全与通信保密,2005(7):342-344. 被引量:2
  • 2Free Software Foundation. NST WiKi[EB/OL]. (2009- 05-04)[2009-05-30]. http: //www. networksecuritytoolkit.org/. 被引量:1
  • 3pblankenbaker, rwhalb. NST Project[EB/OL]. (2009- 01-09)[2009-02-07]. http: //www.sourceforge.net/ projects/nst. 被引量:1
  • 4VMware, Inc. Network Security Toolkit(NST) Virtual Machine[EB/OL]. (2009-01-09)[2009-02-06]. http: //www.vmware.com/appliances/. 被引量:1
  • 5NEIGER G, SANTONI A, LEUNG F. Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization[J]. Intel Technology Journal, 2006, 10(3) : 167-177. 被引量:1
  • 6BARHAM P, DRAGOVIC B, FRASER K, et al. Xen and the Art of Virtualization[C]//ACM.SOSP'03 Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. NewYork: ACM, 2003: 164-177. 被引量:1
  • 7ARTEM D, PAUL R, MONIRUL S, et al. Ether: Malware Analysis via Hardware Virtualization Extensions[C]//ACM. CCS2008. NewYork: ACM, 2008: 51-62. 被引量:1
  • 8PFOH J, SCHNEIDER C, ECKERT C. Nitro: Hardware- based System Call Tracing for Virtual Machines[C]//Computer Science. Advances in Information and Computer Security, 2011. Tokyo, Japan: Computer Science, 2011: 96-112. 被引量:1
  • 9PAYNE B D, CARBONE M, LEE W. Secure and Flexible Monitoring of Virtual Machines[C]//IEEE. ACSAC.2007. Miami Beach, FL: IEEE Conference Publications, 2007: 385-397. 被引量:1
  • 10贺青,王轶骏,薛质.基于Xen硬件虚拟机的虚拟蜜网研究[J].信息安全与通信保密,2008,30(6):83-85. 被引量:3

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部