{"title":"T-Netm:虚拟机上的透明网络监控","authors":"Pengchuan Du, Xiaoyong Li","doi":"10.1109/CCIOT.2016.7868304","DOIUrl":null,"url":null,"abstract":"With the increasing deployment of the cloud computing, security issues of the cloud computing have drawn more and more attentions. In addition, as the virtualization is the core technology of the cloud computing, it has also attracted widespread attentions in both industry and academy. It is widely acknowledged that cloud computing could not be widely adopted in industry unless correctly identify and deal with the security threats. In this paper, we present a transparent network monitoring system on virtual machine. The monitoring system is deployed in the host system and isolated from the target virtual machine. Extensive experiments have been conducted in this paper. The experimental results have verified the effectiveness and practicality of the system.","PeriodicalId":384484,"journal":{"name":"2016 2nd International Conference on Cloud Computing and Internet of Things (CCIOT)","volume":"241 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"T-Netm: Transparent network monitoring on virtual machine\",\"authors\":\"Pengchuan Du, Xiaoyong Li\",\"doi\":\"10.1109/CCIOT.2016.7868304\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the increasing deployment of the cloud computing, security issues of the cloud computing have drawn more and more attentions. In addition, as the virtualization is the core technology of the cloud computing, it has also attracted widespread attentions in both industry and academy. It is widely acknowledged that cloud computing could not be widely adopted in industry unless correctly identify and deal with the security threats. In this paper, we present a transparent network monitoring system on virtual machine. The monitoring system is deployed in the host system and isolated from the target virtual machine. Extensive experiments have been conducted in this paper. The experimental results have verified the effectiveness and practicality of the system.\",\"PeriodicalId\":384484,\"journal\":{\"name\":\"2016 2nd International Conference on Cloud Computing and Internet of Things (CCIOT)\",\"volume\":\"241 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd International Conference on Cloud Computing and Internet of Things (CCIOT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCIOT.2016.7868304\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Cloud Computing and Internet of Things (CCIOT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCIOT.2016.7868304","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
T-Netm: Transparent network monitoring on virtual machine
With the increasing deployment of the cloud computing, security issues of the cloud computing have drawn more and more attentions. In addition, as the virtualization is the core technology of the cloud computing, it has also attracted widespread attentions in both industry and academy. It is widely acknowledged that cloud computing could not be widely adopted in industry unless correctly identify and deal with the security threats. In this paper, we present a transparent network monitoring system on virtual machine. The monitoring system is deployed in the host system and isolated from the target virtual machine. Extensive experiments have been conducted in this paper. The experimental results have verified the effectiveness and practicality of the system.