The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine) 


Vol. 36,  No. 8, pp. 947-953, Aug.  2011


PDF
  Abstract

These days, a consistent and fatal attack attribute toward a database has proportionally evolved in the similar development form to that of security policy. Because of access control-based defensive techniques regarding information created in closed networks and attacks on a limited access pathway, cases of infringement of many systems and databases based on accumulated and learned attack patterns from the past are increasing. Therefore, the paper aims to separate attack information by its types based on a virtual infringement pattern system loaded with dualistic VM in order to ensure stability to limited certification and authority to access, to propose a system that blocks infringement through the intensive management of infringement pattern concerning attack networks, and to improve the mechanism for implementing a test that defends the final database, the optimal defensive techniques, and the security policies, through research.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

W. Seo and M. Jun, "The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine)," The Journal of Korean Institute of Communications and Information Sciences, vol. 36, no. 8, pp. 947-953, 2011. DOI: .

[ACM Style]

Woo-seok Seo and Moon-seog Jun. 2011. The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine). The Journal of Korean Institute of Communications and Information Sciences, 36, 8, (2011), 947-953. DOI: .

[KICS Style]

Woo-seok Seo and Moon-seog Jun, "The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine)," The Journal of Korean Institute of Communications and Information Sciences, vol. 36, no. 8, pp. 947-953, 8. 2011.