Firewall system based on virtual machine

A firewall and virtual machine technology, applied in the field of information security network access control, can solve the problems of firewall function shielding, misoperation or execution of Trojan horse programs, flexibility and security risks, etc., and achieve an easy-to-achieve effect

Inactive Publication Date: 2009-04-15
SOUTH CHINA UNIV OF TECH
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, because personal firewalls are installed in the operating system, they mainly have four shortcomings: 1. After reinstalling the operating system, the firewall needs to be installed again, and there is a protective vacuum during this period; 2. The implementation of firewall software depends on the specific operating system. Different operating systems need to implement multiple sets of firewalls; 3. The security of the firewall itself depends on the operating system. Once there are loopholes or backdoors in the operating system, hackers may bypass the firewall and access private data; 4. Local operations can close the firewall, and the user's Misoperation or execution of a Trojan horse program may cause the firewall function to be blocked, thus revealing it under network attacks
Therefore, the traditional personal firewall deployment method has hidden dangers in terms of flexibility and security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firewall system based on virtual machine
  • Firewall system based on virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described below in conjunction with the accompanying drawings.

[0024] Such as figure 1 As shown, the major modules from bottom to top are: hardware device, BIOS, Xen host system and various client systems. Different from the traditional personal firewall, the firewall of the present invention is deployed in the Xen host system.

[0025] The Xen host system is the most important part of the system and consists of Xen and Domain0. Xen is a virtual machine monitor, which replaces the position of the operating system, directly interacts with hardware devices, and creates a virtual machine environment for the guest operating system to run. Domain0 is a Linux system running in the default virtual machine created by Xen, which is responsible for assisting Xen in managing other virtual machines. The back-end network card is the aforementioned virtual network card, which corresponds to the front-end network card in the client system one...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a firewall system based on a virtual machine, comprising a kernel system, a firewall and a customer operation system. The kernel system is arranged in a safe partition of a disk. The customer operation system is used directly by users. The virtual network connection is adopted between the kernel system and the customer operation system. The network access of the customer operation system is forwarded by the kernel system. The firewall is arranged in the kernel system, and the network access of the customer operation system is controlled by the firewall after being forwarded by the kernel system. The firewall system based on the virtual machine has the advantages that: firstly, the firewall software does not depend on the type of the customer operation system which can be Windows, Linux or other operational systems; secondly, even being reinstalled, the customer operation system is stilled protected by the bottom firewall; thirdly, even the customer operation system is provided with vulnerabilities or a backdoor, private data which are sent out accidentally can also be intercepted by the bottom firewall.

Description

technical field [0001] The invention belongs to the field of network access control of information security. technical background [0002] A firewall refers to a combination of a series of components set between different networks (such as trusted intranets and untrusted public networks) or network security domains. It can realize network security protection by monitoring, restricting, and changing the data flow across the firewall, and shielding the information, structure, and operation status of the network from the outside as much as possible. [0003] According to the application deployment location of the firewall, it can be divided into three categories: boundary firewall, personal firewall and hybrid firewall. The boundary firewall is located at the boundary of the internal and external networks, and its function is to isolate the internal and external networks and protect the internal network at the boundary; the personal firewall is installed in a single host, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/36
Inventor 刘发贵刘文谦苏翔
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products