期刊文献+

基于虚拟化的网络安全问题研究 被引量:9

Research on network security issues based on virtualization
下载PDF
导出
摘要 云环境中网络虚拟化已成为网络技术演进的重要方向,虚拟化网络环境面临的网络安全问题则成为当前网络安全研究的热点。虚拟化条件下的网络既面临传统网络中已存在的安全问题,也有引入虚拟化特性之后出现的一系列新问题。通过对网络中的各要素及其关系进行描述,分析了虚拟化网络环境的特性,进而分析了虚拟化网络环境面临的安全威胁,包括物理网络威胁、虚拟局域网威胁和虚拟网络威胁等。通过构建威胁矩阵进行网络安全风险分析,指出高、中、低等不同级别安全威胁的类型。针对典型的网络安全风险,给出了相应的安全防护对策。 Network virtualization has become the developing direction of the future network,the network security problem of the virtual network environment has become the hot spot of network security research. The network based on virtualization includes the security problems in traditional network as well as the new ones after virtualized. In order to do security risk analyses,the characteristics of the virtualized network environment has been analysed by describing the objects and the relations between them in the network. Then the security menace has been sum up and the risk matrix has been built. Based on these analyses,the corresponding defending countermeasures are put forward to solve the typical problems in the virtualized network environment.
出处 《微型机与应用》 2017年第11期1-4,共4页 Microcomputer & Its Applications
关键词 虚拟化 网络安全 安全威胁 风险分析 对策 virtualization network security security menace risk analysis countermeasure
  • 相关文献

参考文献5

二级参考文献163

  • 1Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss 被引量:1
  • 2Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf 被引量:1
  • 3Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403. 被引量:1
  • 4Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11. 被引量:1
  • 5Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28. 被引量:1
  • 6Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117. 被引量:1
  • 7Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43. 被引量:1
  • 8Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. In: Proc. of the 6th Symp. on Operating System Design and Implementation. Berkeley: USENIX Association, 2004. 137-150. 被引量:1
  • 9Burrows M. The chubby lock service for loosely-coupled distributed systems. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 335-350. 被引量:1
  • 10Chang F, Dean J, Ghemawat S, Hsieh WC, Wallach DA, Burrows M, Chandra T, Fikes A, Gruber RE. Bigtable: A distributed storage system for structured data. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 205-218. 被引量:1

共引文献1383

同被引文献31

引证文献9

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部