[1]周峰.基于虚拟化的办公系统因特网安全访问[J].计算机技术与发展,2010,(10):184-188.
 ZHOU Feng.High-Security Internet Accessing in OA Based on Virtualization Technology[J].,2010,(10):184-188.
点击复制

基于虚拟化的办公系统因特网安全访问()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2010年10期
页码:
184-188
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
High-Security Internet Accessing in OA Based on Virtualization Technology
文章编号:
1673-629X(2010)10-0184-05
作者:
周峰
上海大学计算机学院
Author(s):
ZHOU Feng
School of Computer,Shanghai University
关键词:
VMware虚拟机Internet安全访问
Keywords:
VMware VM Internet accessing control methods
分类号:
TP393.08
文献标志码:
A
摘要:
随着中国金融业国际化程度提高,金融企业内部信息安全成为重中之重。而作为公司与外界沟通的桥梁,办公访问Internet服务成为了一个不可关闭的风险敞口。通过对主流虚拟化技术的研究,研发一种基于虚拟交换机的Internet安全访问控制方法,用以兼顾Internet访问的必要性与内部信息的安全性。文中详细剖析如何使用虚拟交换机技术实现特殊带外管理,隔离Internet和内部网络,通过总结方案实施过程中的实际经验提出自动监控解决方案,完善了安全隐患和虚机状态的汇报措施,动态地控制风险。针对金融行业信息中心级Int
Abstract:
As China's financial sector to improve the degree of internationalization,the financial enterprise information security has become a priority.As a bridge to communicate with the outside world,office services,access to Internet has become a non-closed exposure.In this paper,mainstream virtualization technology research,development of Internet-based virtual switch security access control methods,which take into account the need for Internet access and internal information security.The article detailed analysis of how to use the Virtual Switch technology to achieve a special band management,isolation Internet and internal networks,while the program implementation process by summarizing the practical experience of automated monitoring solutions to improve the security risks and the virtual machine state reporting measures,and dynamically control risk.In this paper,the financial industry information center-level framework for secure access to Internet is given a key part of the solution,achieved through the deployment of the implementation of complete separation of the logic of the Internet access

相似文献/References:

[1]周平东 陈榕.CAR构件的四种运行时形态[J].计算机技术与发展,2010,(04):1.
 ZHOU Ping-dong,CHEN Rong.Running States of CAR in Elaura[J].,2010,(10):1.
[2]周毅敏 陈榕.Dalvik虚拟机进程模型分析[J].计算机技术与发展,2010,(02):83.
 ZHOU Yi-min,CHEN Rong.Analysis about Process in Dalvik Virtual Machine[J].,2010,(10):83.
[3]冯涛 宋成明.清剿Java程序中的内存泄漏[J].计算机技术与发展,2006,(07):123.
 FENG Tao,SONG Cheng-ming.Exterminates Memory Leaks in Java Programs[J].,2006,(10):123.
[4]朱团结 艾丽蓉.基于共享内存的Xen虚拟机间通信的研究[J].计算机技术与发展,2011,(07):5.
 ZHU Tuan-jie,AI Li-rong.Research on Xen Inter Domain Communication Based on Shared Memory[J].,2011,(10):5.
[5]林龙增 罗省贤.实现多个KVM虚拟机通信的串口转发器方法[J].计算机技术与发展,2012,(02):241.
 LIN Long-zeng,LUO Sheng-xian.A Serial Forwarder Method for Communication of Multiple KVM Virtual Machines[J].,2012,(10):241.
[6]张文晓 戴航 黄东旭.基于虚拟机的Rootkit检测系统[J].计算机技术与发展,2012,(07):128.
 ZHANG Wen-xiao,DAI Hang,HUANG Dong-xu.A New Rootkit Detection System Based on Virtual Machine[J].,2012,(10):128.
[7]曹伟杰 贺建民 孙志丹.IaaS模式下虚拟机部署机制研究[J].计算机技术与发展,2012,(10):105.
 CAO Wei-jie,HE Jian-min,SUN Zhi-dan.Research on Mechanism of Deploying Virtual Machine in Mode of IaaS[J].,2012,(10):105.
[8]韩玲,蔡皖东.面向Microsoft Virtual PC的虚拟机远程检测方法[J].计算机技术与发展,2013,(12):134.
 HAN Ling,CAI Wan-dong.Remote Detection Method Oriented Microsoft Virtual PC[J].,2013,(10):134.
[9]江雪,朱永强.基于分层权值的恶意程序仿真系统设计与实现[J].计算机技术与发展,2014,24(04):143.
 JIANG Xue,ZHU Yong-qiang.Design and Implementation of One Malicious Program Simulation System Based on Stratification Weights[J].,2014,24(10):143.
[10]孟蒙,茅苏. 基于云计算的可反馈负载均衡策略的研究[J].计算机技术与发展,2014,24(10):135.
 MENG Meng,MAO Su. Study on Feedback Load Balancing Strategy Based on Cloud Computing[J].,2014,24(10):135.
[11]包敬海 周小珠 樊东红.基于VMWare构建虚拟网络实验室的研究[J].计算机技术与发展,2010,(06):242.
 BAO Jing-hai,ZHOU Xiao-zhu,FAN Dong-hong.Research of Building Virtual Network Laboratory Based on VMWare[J].,2010,(10):242.

备注/Memo

备注/Memo:
周峰(1984-),男,上海人,硕士研究生,研究方向为信息安全、虚拟化应用;
更新日期/Last Update: 1900-01-01