DocumentCode :
2703192
Title :
Deploying virtualization technology for verification of a network security
Author :
Abramov, Evgeny ; Makarevich, Oleg
Author_Institution :
Taganrog Inst. of Technol., Southern Fed. Univ., Taganrog, Russia
fYear :
2010
fDate :
12-14 Oct. 2010
Firstpage :
1
Lastpage :
3
Abstract :
This article discusses the issue of increasing the security of computer networks based on the constant verification of the level of information security. Simulation of the network, based on accurate data derived from the security audit, allows for constant monitoring of the level of network security. Using hardware virtualization to build models to avoid the restrictions of the programming model and apply the full range of information resources impacts for verification of security level is proposed.
Keywords :
computer network security; virtual reality; computer network security; hardware virtualization technology; information security; security audit; Computational modeling; Educational institutions; Hardware; Information security; Manuals; Testing; OSSTMM; Security audit; XEN; hardware virtualization; simulation; vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Application of Information and Communication Technologies (AICT), 2010 4th International Conference on
Conference_Location :
Tashkent
Print_ISBN :
978-1-4244-6903-1
Electronic_ISBN :
978-1-4244-6904-8
Type :
conf
DOI :
10.1109/ICAICT.2010.5612012
Filename :
5612012
Link To Document :
بازگشت