Paper
5 May 2022 Research on event capture method for network security testbed based on trusted execution environment
Author Affiliations +
Proceedings Volume 12245, International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022); 122450P (2022) https://doi.org/10.1117/12.2635977
Event: International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022), 2022, Sanya, China
Abstract
In the network security test environment, due to the destructive nature of network adversarial behavior and uncontrollable boundaries and other characteristics, it is easy to lead to security risks in the event capture process. A real-time and secure event capture method for network security tests is an effective guarantee of the authority of the exercise results, and is also a pressing challenge for the key applications of network security tests. To this end, the article investigates the event capture technology for network security tests in a trusted execution environment, and designs a secure and efficient event capture method based on SGX technology, Elastic Stack technology stack and virtualization technology tools to ensure the authenticity and confidentiality of the original data in the network security test environment, which can realize the secure and The method enables secure and efficient capture of virtual host behavior logs in the test environment.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yuxiang Zhang, Jian Liu, Ming Xian, and Huimei Wang "Research on event capture method for network security testbed based on trusted execution environment", Proc. SPIE 12245, International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022), 122450P (5 May 2022); https://doi.org/10.1117/12.2635977
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Data storage

Computer security

Defense technologies

Data acquisition

Data communications

Operating systems

RELATED CONTENT


Back to Top