支持多种虚拟化技术的进程非代理监控方法

来源 :第八届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:allsky_
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
为保障云环境中虚拟机应用的安全性与可用性,本文提出一种能够支持多种虚拟化技术的进程非代理监控方法.利用该方法设计一个非代理的进程主动监控框架.本框架将进程监控点设在虚拟机监视器中,而不在其中安装任何代理.该框架可以支持VMware、Xen、KVM三种虚拟化技术,实现了对客户操作系统(Guest OS)的隐藏进程检测和进程负载监控保证虚拟机安全可靠地运行.对于隐藏进程检测,从被监控虚拟机外部获取活动进程链、遍历线程获得进程列表,进而利用交叉视图技术检测出隐藏进程;对于进程负载监控,除开活动进程链,还需寻找网络连接信息相关的另两条链表,从中定位到待监控进程,进而获得进程负载状况.实验结果表明,本框架能有效高效地检测出系统中的隐藏进程,也能准确获取特定进程的负载信息.
其他文献
电化学发光(ECL)是一种在电极表面由电化学反应引发的特异性化学发光现象,包括了电化学激发和化学发光检测两个过程.ECL检测具有高选择性和高灵敏度的优点,已广泛用于环境监测,临床诊断,药物分析等领域[1].我们利用蜡烛灰合成了具有高效ECL淬灭效率的新型无定形碳纳米粒子(ACNPs),ACNPs具有较好的理化性质,并显示出优于其它淬灭剂(如量子点)的淬灭能力[2].本研究中利用掺杂了金纳米粒子的壳
Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.In this paper,we propose a asymmetrical quantum encryption protocol bas
The growing popularity and application of Web services have led to an increase in attention to the vulnerability of software based on these services.Vulnerability testing examines the trustworthiness,
With the pervasiveness of Vehicle Information Svstem (VIS) and the advance of Vehicular Ad-hoc Network ( VANET).Intelli- gent TransportationSystem (ITS).which can improve road traffic and reduce the n
Revealing security vulnerabilities is one of great challenges for the Android ecosvstem Staticanalvsis is the usual approach of the securitv analysis for computer software However.it is undirected and
信任模型是解决开放式网络环境中信任问题的有效方式,信任量化是可信管理中亟待解决的关键问题.针对信任量化中动态适应能力不足,信任的有效聚合不足,激励机制考虑不足等问题,根据信任模型设计原则,本文在推荐信任量化中引入奖惩因子体现推荐实体对访问主体的直接信任的可靠程度,采用推荐实体的评价可信度来决定访问客体是否采纳推荐实体的推荐;综合信任的度量过程中采纳平衡权重因子解决直接信任和推荐信任的权重问题;最后
Trusted Platform Module (TPM) is the "root of trust" of the whole trusted computing platform.It is necessary to analyze the TPM 2.0 specifications to judge whether it has the old vulnerabilities in TP
As Cloud Computing is one of the hot and trending technologies.A large amount of sensitive information is increasingly centralized into the cloud.To preserve the datas privacy,sensitive data has to be
The anomaly detection as a kind of intrusion detection way is good at detecting the unknown attacks or new attacks,and it has attracted much attention during recent years.A new hybrid intrusion detect
Attribute based encryption enables data owners to share their information by specifying access control policies while outsourcing their encrypted data to the cloud.However,there are no efficient searc