DocumentCode :
3735339
Title :
Benefit of construct information security environment based on lightweight virtualization technology
Author :
Jen-Chieh Wang;Wei-Fun Cheng;Han-Chiang Chen;Hung-Li Chien
Author_Institution :
Department of Information Management Center, National Chung-Shan Institute of Science and Technology, Taoyuan, Taiwan
fYear :
2015
Firstpage :
1
Lastpage :
4
Abstract :
Recently, in order to strengthen the capabilities of security defense and emergency coordination, training in a virtual environment is more and more important. In a virtual environment, the trainee can operate the really system. The answer of how to attack or defend is no more just one solution. You can use any method or trick to reach the goal. The outcome of training in a virtual environment can directly prove the trainee´s capability. Although there is a lot of advantage to use virtual environment, it´s a big problem to build it. The work of creating virtual environment includes allocation and maintenance. To allocation, because training in an environment providing daily service will decrease the performance of service. It´s hard to allocate virtual environment in a real environment providing daily service. In order to simulate the real environment, it needs a lot of space and powerful computing. To maintenance, the built virtual environment needs expandable, flexibility and reusable. For example, it can change IP or count/password easily so the test would not always the same and virtual environments can be reusable. For now, it use cloud computing[8] to virtualize the virtual environment to solve the two problem. But there is still a problem of too heavy. In this research, we try to build virtual environment based on Docker which provide manager a structured process to build a virtual environment by building a independent containers and Open vSwitch in the operating system layer. We can monitor the status of virtual environment with charts so the manager can control the system more effective and help researchers or military to do security education.
Keywords :
"Containers","Virtualization","Virtual machining","Security","Education","Hardware"
Publisher :
ieee
Conference_Titel :
Security Technology (ICCST), 2015 International Carnahan Conference on
Print_ISBN :
978-1-4799-8690-3
Electronic_ISBN :
2153-0742
Type :
conf
DOI :
10.1109/CCST.2015.7389695
Filename :
7389695
Link To Document :
بازگشت