Font Size: a A A

The Design And Implementation Of The Virtual System And Its CPU Protection Mechanism Based On The UTM

Posted on:2012-03-01Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiFull Text:PDF
GTID:2178330335459847Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the rapid development and the polybasic of the network, the network threats are increasing and becoming more and more various. Viruses, worms, network intrusion, DoS attack and leak have caused great losses. And in these threats, those treats which are based on applications have reach a larger proportion gradually. UTM is just the united safety equipment to solve these threats.At present, mostly, the UTM adopts multi-core technology, and is integrated with the firewall, intrusion defense, anti-virus, anti-spam filter and content filter. So it possesses great performance, powerful functions and suitable price compared with the single equipment. But to some small company, the procurement cost remains high-priced.In order to improve the cost performance of the UTM usage for the small businesses and large-scale enterprise in different departments, this paper designed and implemented a virtual system based on UTM. The virtual system can divide the UTM physical equipment into several virtual equipments in the logical. The packets of the virtual system can be forwarded according to their respective virtual system routes. Also, each virtual system may have independent system resources, including the administrators, security policy, user authentication database and etc. Those virtual systems will not influence and interference each other, and reduce cost greatly while successfully simplify the safety management and network structure.At the same time, this paper also designed a set of CPU protection mechanism aimed at the virtual system. This mechanism can distribute the CPU resources for each virtual system according to the weights, and if one of the virtual systems'resource consumption is bigger, it will not affect other virtual systems'usages. Then the virtual systems are really mutual independence. Finally, this paper improved the algorithm of the CPU protection mechanism. The test results showed that the improved mechanism can more effectively improve CPU usage and real-time processing speed.
Keywords/Search Tags:network threat, UTM, virtual system, CPU protection mechanism, improving
PDF Full Text Request
Related items