Font Size: a A A

Research And Implementation Of Virtual System Process Protection Technology

Posted on:2016-05-02Degree:MasterType:Thesis
Country:ChinaCandidate:W L XuFull Text:PDF
GTID:2208330461482870Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology, computers have become in our lives is very important part of our daily lives to bring more and more convenient, but at the same time the security of computer problems are gradually becoming prominent. The rapid development of computer viruses and other malicious code Trojans, the harm is also growing, how to defend the new threats and how to maintain the security of the entire operating system is increasingly becoming an important issue. Malware detection tool can bypass even destroy, in recent years, the emergence and development of virtualization technology not only makes the architecture of the computer changes, and isolation and sharing virtualization technology also provides protection to process new ideas.For all systems in a virtual machine monitor that can be generated by the process operation to intercept calls, testing and found a suspicious process privileged operations judgment and isolation, paper process for virtualization system protection features to design a suitable virtualization process protection system architecture, the protective structure consists of the audit module, the detection module, and the impact of file system isolation module. Call short sequence is based on the same process is characterized by the relative stability of the system, the design of the "system processes the call short sequences and sequence characteristics consistent with the security, if not match the suspect," the security policy to user-level process in a secure environment generated by the system during normal calling sequence is characterized by a sequence of short, non-absolute security systems and processes running in case of a short sequence of calls generated by comparing the process to identify safe or not; to achieve a calling sequence-based system process protection system and for functional testing and performance testing, the experimental results show that the method can effectively protect a variety of attack defense, and the performance loss within an acceptable range.
Keywords/Search Tags:Virtualization, Process Protection, Virtual Monitor Machine, System Call
PDF Full Text Request
Related items