Software Journal--security monitoring Xiang based on virtualization Golden Sea, Shundeqing, Chen Xuaquan the related work based on virtualization security monitoring is introduced in detail, such as intrusion detection, honeypot, file integrity monitoring, malicious code detection and analysis, security monitoring architecture and security monitoring versatility. Finally, it summarizes the deficiencies of the existing research work, The future research direction is pointed out. Keywords: virtualization, virtual Machine Manager, security monitoring, virtual machine introspection temp_120 ...
The BitDefender Linux version is an on-demand scan tool that detects and clears malicious code for a single file or for the entire file system in a manually specified manner, either on a command line or in a script. It is a http://www.aliyun.com/zixun/aggregation/29607.html "> free software that you can freely use and disseminate without any use of the license file." Download Debian file: * wget Http://dow ...
Ucdetector is unecessary Code detector abbreviation, is a http://www.aliyun.com/zixun/aggregation/13428.html ">eclipse plug-in tool, Used to detect public code that is not functioning in Java. Ucdetector can also be used to detect circular dependencies between classes. Ucdetector version 1.9.0 supports the Eclipse ID for Java development ...
Multi-engine detection mechanism in cloud defense system Qiang Wei Cheng Qin Yu Shideqing provides security for clients by building multiple types of detection engines in the cloud. To move the traditional antivirus engine installed on the client into the cloud, the client only retains lightweight host intrusion defense software, blocking local file access, and upload the file to the cloud for multiple engine scanning, cloud using a comprehensive decision algorithm to detect. In order to test the system detection rate, using 1789 malicious code samples for scanning, the system's comprehensive detection rate of 95.6%. Test results show that the use of multiple engine detection can be ...
Parallel cloning code detection in the Hadoop cluster Yiuchong cloning code can cause project maintenance difficulties, weaken the robustness of the project, and the bugs contained in the cloned code can damage the entire project. The current Cloning code detection technology is either limited to detecting only a few clones of code, or requires very high detection time. And if you need to detect a lot of source code, the main memory of a machine may not be able to store all the information. The possibility research on the parallel operation of cloning code detection technology, using the Cloning Code detection technology based on program dependency graph, ...
An efficient malicious code detection mechanism for virtual desktop Guo Yu Yong compared with traditional malicious code detection methods, the malicious code detection method facing virtual desktop faces the challenge of performance. Multiple virtual desktops on the same physical server simultaneously carry out malicious code detection, making hardware such as disk a serious IO performance bottleneck. This paper presents an efficient virtual desktop malicious code detection scheme, based on the female parent cloning technology of virtual desktop malicious code detection Mechanism (mcids), mcids according to the characteristics of virtual desktop system, through the system image network storage cloning ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.