Log Secure Access and Transmission Technology Research in a Virtual Environment
This paper puts forward a logging process monitoring method based on full virtualization to solve the problems of log lost and non security log transmission. Making use of fully virtualized technology, this method detects the suspicious log in the virtual monitor machine and makes record of logs. It used SSL technology to transmit log to the remote backup machine to save and analyze it.
X. P. Wang and W. J. Wang, "Log Secure Access and Transmission Technology Research in a Virtual Environment", Applied Mechanics and Materials, Vols. 229-231, pp. 1984-1989, 2012