Security impacts of virtualization on a network testbed

Yu-Lun Huang*, Borting Chen, Ming Wei Shih, Chien Yu Lai

*此作品的通信作者

研究成果: Conference contribution同行評審

22 引文 斯高帕斯(Scopus)

摘要

Modern virtualization technologies provides an optimal use of underused hardware resources by sharing them among virtual machines hosted on the same physical machine. These technologies hence have been broadly adopted in many areas, such as server consolidation, virtualized network testbeds, etc. A large-scale network testbed is considered one of the useful tools for evaluating or verifying advanced networking technologies. To construct a network testbed that matches as much as a real setup, the testbed should meet requirements of isolation, fidelity, repeatability, scalability, containment and extensibility. Among these requirements, scalability can be realized by the modern virtualization technology, whereas vulnerability and security weakness brought along with virtualization can also be harmful to the other requirements of a network testbed, like isolation and fidelity. This paper reviews the modern virtualization technologies, their resource management mechanisms, and the known attacks of these virtualization technologies. Then, we discuss the requirements of existing network testbeds and the security impacts when introducing such modern virtualization technologies into a network testbed.

原文English
主出版物標題Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012
頁面71-77
頁數7
DOIs
出版狀態Published - 2012
事件2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012 - Gaithersburg, MD, 美國
持續時間: 20 6月 201222 6月 2012

出版系列

名字Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012

Conference

Conference2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012
國家/地區美國
城市Gaithersburg, MD
期間20/06/1222/06/12

指紋

深入研究「Security impacts of virtualization on a network testbed」主題。共同形成了獨特的指紋。

引用此