【24h】

Virtualized hosting: Devising a security policy through log analysis

机译:虚拟主机:通过日志分析设计安全策略

获取原文

摘要

The paper provides an overview of three common virtualization threats that have been observed in log files in the authors' network and suggests solutions to mitigate those security vulnerabilities. The solutions offered have been implemented on a network with over 200 hosts 40 of which are virtualized.
机译:本文概述了作者网络日志文件中观察到的三种常见虚拟化威胁,并提出了缓解这些安全漏洞的解决方案。提供的解决方案已在具有200多个主机的网络上实现,其中40个主机已虚拟化。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号