Font Size: a A A

Research And Implementation Of Information Security Training Platform Based On KVM Virtualization Cluster

Posted on:2018-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y HuFull Text:PDF
GTID:2348330518996786Subject:Information security
Abstract/Summary:PDF Full Text Request
Information security training platform is an important part of popularization education information security engineering, is one of the most effective tools for universities to carry out the information security education; Its core idea is to use virtualization technology combining with teaching experience in information security line to design an information security laboratory teaching platform. At the same time, the first generation of the stand-alone version of the number of virtual machines can support is limited, it has been unable to meet the requirements of most universities on the number of experiments, so a cluster of information security training platform is particularly necessary.In this paper, through the analysis of key technologies such as virtualization and cluster, and carry out depth analysis with the research results of predecessors, then on the basis of mastered the principle of virtualization, KVM virtualization applied of the information security training platform to be optimized, and verified. By comparing the test results of the virtual machine and the benchmark, the performance gap between the virtual machine and the real device is obtained. By comparing the test results before and after optimization, the effectiveness of the virtual machine performance optimization scheme is obtained.And combining with the cluster information security training platform environment, when the running state of the virtual machine appears irregular load fluctuations in the experiment, the design that can meet the requirements of virtual machine scheduling algorithm, reduce unnecessary migration, improve resource utilization is an important content of this article.This article describes of following parts:(1) Virtualization technology, cluster technology, cloud computing and we research the correspondence principle.(2) Based on the characteristics of the information security training platform, the KVM virtual machine is optimized and tested.(3) The cluster topology of information security training platform is given.(4) Scheduling model and algorithm of virtual machine are designed for cluster mode.(5) According to the proposed cluster architecture of information security training platform and virtual machine scheduling algorithm, we experiment, and verify its effectiveness.
Keywords/Search Tags:Virtualization, Performance optimization, Framework, Virtual machine Scheduling
PDF Full Text Request
Related items