Abstract
Abstract
In recent years, virtualization technology has been widely used in various operators, but in the IDC virtual resource pool exists malicious scanning, DOS attack, SQL injection, virus Trojan, and based on various vulnerabilities of the invasion behavior. Therefore, there is an urgent need for a virtualization security protection software for IDC. Based on the development and utilization of host whitelist active defense technology, this paper firstly briefly explains the significance of IDC virtualization security technology of host whitelist protection, and at the same time discusses the security method, technology, and implementation scheme of IDC virtualization security technology of host whitelist protection, for the reference of readers.
Subject
General Physics and Astronomy
Reference10 articles.
1. Research on Virtualization security technology [J];Jiaxing;Tianjin Science and technology,2020
2. Risk identification and security under virtualization technology system [J];Shaobo;Digital communication world,2020
3. Research on Application of IDC virtualization security protection technology [J];Jianjun;China new communications,2019
4. Analysis of core technology and development trend of industrial host white list products [J];song;China electric power industry,2018
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Fast Matching Method of Trusted Whitelist Based on Bloom Filter;2022 7th International Conference on Signal and Image Processing (ICSIP);2022-07-20