ISSN 1000-1239 CN 11-1777/TP

• 论文 • 上一篇    下一篇


赵峰1,2,3 金海1,2,3 金莉1 袁平鹏1,2,3   

  1. 1(华中科技大学计算机科学与技术学院 武汉 430074) 2(服务计算技术与系统教育部重点实验室 武汉 430074) 3(集群与网格计算湖北省重点实验室 武汉 430074) (
  • 出版日期: 2010-03-15

VFRS: A Novel Approach for Intrusion Tolerance in Virtual Computing Environment

Zhao Feng1,2,3, Jin Hai1,2,3, Jin Li1, and Yuan Pingpeng1,2,3   

  1. 1(School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074) 2(Key Laboratory of Services Computing Technology and System of Ministry of Education, Wuhan 430074) 3(Provincial Key Laboratory of Cluster and Grid Computing of Hubei, Wuhan 430074)
  • Online: 2010-03-15

摘要: 虚拟计算环境的开放性、复杂性和动态性向入侵容忍提出了新的挑战,提出VFRS方法以解决虚拟计算环境中数据对入侵的容忍问题.设计SCSFA算法分析虚拟计算环境的系统调用行为序列,以识别虚拟计算环境下的入侵企图,预测敏感数据的高危区域;其次,将要保护的数据划分成若干片数据,并以容忍虚拟计算环境随机错误为目标对每个片数据冗余备份;然后将冗余片数据分散到不同虚拟机上.VFRS方法能有效预测虚拟计算环境下的异常入侵,并能较好地容忍虚拟计算环境下的复杂性错误.对VFRS 方法实现的关键问题进行了详细的讨论和分析.

关键词: 入侵容忍, 虚拟计算, 系统安全, 序列预测, 系统调用

Abstract: With the emergence of multi-core processor, virtualization technology has attracted attention and developed rapidly in recent years. Virtual computing environment based on virtual machine becomes a hot topic in the field of network computing. Virtual computing environment is open, complex and dynamic, which has brought new challenges to system security, especially to intrusion tolerance. In this paper, VFRS method is proposed in order to protect sensitive data from intrusion in virtual computing environment. Firstly, a probability computing model is constructed to present system call sequences and the SCSFA algorithm is designed to predict the attempt of intrusion and to determine what need to protect, which is based on the analysis of system call sequence in virtual computing systems; Secondly, the sensitive data protected are divided into a number of film data, and for the goals of random errors tolerance, each tablet data are redundant backup based on Byzantine fault tolerance; Then, the redundant data are distributed to different virtual machines. VFRS method can predict the anomaly intrusion and well tolerate the complicated errors in virtual computing environment. The experimental results show that VFRS is effective and of high performance compared with related work. Some key issues of the VFRS method are also discussed and analyzed in detail.

Key words: intrusion tolerance, virtual computing, system security, sequence forecast, system call