Log Secure Access and Transmission Technology Research in a Virtual Environment


Article Preview

This paper puts forward a logging process monitoring method based on full virtualization to solve the problems of log lost and non security log transmission. Making use of fully virtualized technology, this method detects the suspicious log in the virtual monitor machine and makes record of logs. It used SSL technology to transmit log to the remote backup machine to save and analyze it.



Edited by:

Mohamed Othman




X. P. Wang and W. J. Wang, "Log Secure Access and Transmission Technology Research in a Virtual Environment", Applied Mechanics and Materials, Vols. 229-231, pp. 1984-1989, 2012

Online since:

November 2012




[1] Liu Zhaoyuan, Virtualization technology-based process-level monitoring [J], Microelectronics and Computer(2009).

[2] DU Hai, Monitoring method based on a fully virtualized process [J], Computer Engineering. (2009).

[3] Li Lihong. Under the Windows environment, the log management and event tracking in-depth study [C]. Jilin University(2009).

[4] the formation of Zhang Xinghu. Network server configuration and security management (Windows version) [M], Tsinghua University Press(2011).

[5] http: /www. microsoft. com/zh-cn/server-cloud/readynow/default. aspx Microsoft private cloud site.