[1] ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing [J]. Communications of the ACM,2010,53(4):50-58. [2] FENG D, ZHANG M, ZHANG Y, et al. Study on cloud computing security[J]. Journal of Software, 2012, 22(1): 71-83.(冯登国, 张敏, 张妍, 等. 云计算安全研究[J] . 软件学报, 2011, 22(1): 71-83.) [3] SHAO G, CHEN X, YIN X, et al. Design and implementation of virtual machine traffic detection system based on OpenFlow[J]. Journal of Computer Applications,2014,34(4):1034-1037. (邵国林,陈兴蜀,尹学渊,等. 基于OpenFlow的虚拟机流量监测系统的设计与实现[J]. 计算机应用, 2014,34(4):1034-1037.) [4] LOCKWOOD J W, MOSCALA J, KULIG M. Internet worm and virus protection in dynamically reconfigurable hardware[C]// Proceedings of the 2003 ACM CCS Workshop on Rapid Malcode. New York: ACM, 2003:1-8. [5] XIN Y, FANG B, HE L, et al. Worm detection and signature extraction based on communication characteristics [J]. Journal on Communications, 2007, 28(12): 1-7.(辛毅,方滨兴,贺龙涛,等. 基于通信特征分析的蠕虫检测和特征提取方法的研究[J]. 通信学报, 2007, 28(12): 1-7.) [6] ZHU H, LI W, SHI H. Peer behavior based proactive P2P worm detection[J]. Computer Engineering and Applications, 2013, 49(7):93-97.(朱晖,李伟华,史豪斌.基于节点行为的主动P2P蠕虫检测[J].计算机工程与应用,2013,49(7):93-97.) [7] SU M. Using clustering to improve KNN-based classifiers for online anomaly network traffic identification[J]. Journal of Network and Computer Applications, 2011, 34(2): 722-730. [8] SHAH B, TRIVEDI H B. Artificial neural network based intrusion detection system: a survey[J]. International Journal of Computer Applications, 2012, 39(6): 13-18. [9] GUAN X, QIN T, LI W, et al. Dynamic feature analysis and measurement for large-scale network traffic monitoring [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 905-919. [10] XIANG G, JIN H, ZOU D, et al. Virtualization-based security monitoring[J]. Journal of Software, 2012, 23(8): 2173-2187.(项国富, 金海, 邹德清, 等. 基于虚拟化的安全监控[J]. 软件学报,2012,23(8):2173-2187.) [11] LIU Q, WANG G, WENG C, et al. A mandatory access control framework in virtual machine system with respect to multi-level security I: theory[J]. China Communications, 2010(4): 137-143.(刘谦,王观海,翁楚良,等. 一种虚拟机系统中关于多级安全的强制访问控制框架Ⅰ: 理论[J]. 中国通信,2010(4): 137-143.) [12] LIU Q, WANG G, WENG C, et al. A mandatory access control framework in virtual machine system with respect to multi-level security II: implementation [J]. China Communications, 2011(2): 86-94.(刘谦,王观海,翁楚良,等.一种虚拟机系统下关于多级安全的强制访问控制框架Ⅱ: 实现[J]. 中国通信,2011(2): 86-94.) [13] DUNLAP G W, KING S T, CINAR S, et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay[C]// Proceedings of the 5th Symposium on Operating Systems Design and Implementation. New York: ACM, 2002: 211-224. |