{"title":"5G MEC虚拟化环境监控技术研究","authors":"Xiangqun Wang, Jiaxuan Fei, Wei Huang, Wei Liu","doi":"10.1109/ispec53008.2021.9735904","DOIUrl":null,"url":null,"abstract":"In view of the security risks in 5G network virtualization environment, this paper describes the security monitoring components of 5G MEC network virtual machine and container environment. By monitoring the host machine, Docker, container, KVM and other environments, the security status of operation permissions, network communication, file system, resource limitation, run operation, process operation and so on can be collected. The design scheme of the monitoring module and the realization method of the key function modules are introduced in detail, and the function verification is carried out.By monitoring the virtualized environment, the security protection of MEC and other nodes can be effectively realized, the overall defense capability of 5G network in power system can be improved, and the existence of 5G network carrying power business can be seen, managed and controllable.","PeriodicalId":417862,"journal":{"name":"2021 IEEE Sustainable Power and Energy Conference (iSPEC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Monitoring Technology of 5G MEC Virtualization Environment\",\"authors\":\"Xiangqun Wang, Jiaxuan Fei, Wei Huang, Wei Liu\",\"doi\":\"10.1109/ispec53008.2021.9735904\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In view of the security risks in 5G network virtualization environment, this paper describes the security monitoring components of 5G MEC network virtual machine and container environment. By monitoring the host machine, Docker, container, KVM and other environments, the security status of operation permissions, network communication, file system, resource limitation, run operation, process operation and so on can be collected. The design scheme of the monitoring module and the realization method of the key function modules are introduced in detail, and the function verification is carried out.By monitoring the virtualized environment, the security protection of MEC and other nodes can be effectively realized, the overall defense capability of 5G network in power system can be improved, and the existence of 5G network carrying power business can be seen, managed and controllable.\",\"PeriodicalId\":417862,\"journal\":{\"name\":\"2021 IEEE Sustainable Power and Energy Conference (iSPEC)\",\"volume\":\"72 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE Sustainable Power and Energy Conference (iSPEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ispec53008.2021.9735904\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Sustainable Power and Energy Conference (iSPEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ispec53008.2021.9735904","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Monitoring Technology of 5G MEC Virtualization Environment
In view of the security risks in 5G network virtualization environment, this paper describes the security monitoring components of 5G MEC network virtual machine and container environment. By monitoring the host machine, Docker, container, KVM and other environments, the security status of operation permissions, network communication, file system, resource limitation, run operation, process operation and so on can be collected. The design scheme of the monitoring module and the realization method of the key function modules are introduced in detail, and the function verification is carried out.By monitoring the virtualized environment, the security protection of MEC and other nodes can be effectively realized, the overall defense capability of 5G network in power system can be improved, and the existence of 5G network carrying power business can be seen, managed and controllable.