Font Size: a A A

Network Access Control System Model Research Based On Virtualization

Posted on:2010-04-02Degree:MasterType:Thesis
Country:ChinaCandidate:S L ChenFull Text:PDF
GTID:2178360278966409Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With the use of software simulation of computer hardware, virtualization technology develops and matures and has many application solutions. As the performance of computer hardware upgrades, hardware support for virtualization technology gradually matures and becomes towards perfection (Intel VT, AMD-V), this will make use of our daily work environment to move to virtualization platform possible. For most operating systems, the existing application model will be the operating system is installed directly on the raw hardware. Making solutions which can effectively secure the network attracted widespread attention.Based on the traditional bare-metal operating system installed in the working environment for migration to virtualization technology-based platform, that can be applied from the system model than existing hardware abstraction layer in lower-level operating system to achieve control, the existing operation systems deployed in its virtualization technology platform for the key hardware control, directly from the original running on hardware virtualization operating system shifted to the platform, physical dimensions of configuration of its hardware access made possible, the separation from the outside to achieve a variety of security policies, in order to realize to prevent leakage of sensitive information made an optional solution, applications for the realization of a comprehensive network security has opened up another way to realize.The full text through a combination of theoretical and experimental research methods, demonstrated that the virtualization technology-based network access control system. The entire system to meet the design expectations, but the benchmark results show that the system has much obvious performance loss, there is room for performance optimization. The details of whole system to achieve the ultimate security goal have yet to be further improved.
Keywords/Search Tags:full-virtualization, para-virtualization, network access control, kernel firewall (netfilter)
PDF Full Text Request
Related items