信息安全研究 ›› 2025, Vol. 11 ›› Issue (7): 652-.

• 学术论文 • 上一篇    下一篇

虚拟化环境下安全资源调度方法研究

李建强   

  1. (国家计算机网络应急技术处理协调中心北京100029)
  • 出版日期:2025-07-29 发布日期:2025-07-29
  • 通讯作者: 李建强 硕士,高级工程师.主要研究方向为网络安全和数据安全. ljq@cert.org.cn
  • 作者简介:李建强 硕士,高级工程师.主要研究方向为网络安全和数据安全. ljq@cert.org.cn

Security Resource Scheduling Methods in Virtualization Environment

Li Jianqiang   

  1. (National Computer Network Emergency Response Technical TeamCoordination Center of China, Beijing 100029)
  • Online:2025-07-29 Published:2025-07-29

摘要: 在云计算时代,安全技术与云计算的融合催生了一种创新的安全防御机制——安全资源虚拟化.作为一种新兴的基于云计算架构的安全防护体系,通过虚拟化和软件定义技术,将防火墙、入侵检测预防系统、防病毒等多种安全功能整合为可灵活调配的资源集合.深入探讨了安全资源虚拟化的相关概念、优势、典型调度算法及其未来发展方向.详细分析了虚拟化安全资源的构成设备和功能特性,并指出了其在资源虚拟化与共享、灵活扩展、统一管理以及与云环境深度融合等方面的优势.在调度算法方面,研究了珊瑚礁任务调度算法、免疫遗传算法、改进花粉传授算法以及基于帕累托最优理论的改进算法等多种典型的虚拟化安全资源与任务调度策略,并探讨了它们的优势和适用场景.展望了安全资源虚拟化的未来发展方向,旨在为安全资源虚拟化的进一步优化配置和成本控制提供参考,推动云计算领域在保障安全的前提下实现更高效、更稳定的发展.

关键词: 虚拟化, 安全资源, 任务调度, 资源调度, 优化算法

Abstract: In the era of cloud computing, The integration of security technology and cloud computing has given rise to an innovative security defense approachvirtualization of security resources. This novel architecture serves as a basis for a comprehensive security protection system that consolidates multiple security functionsincluding firewalls, intrusion detection and prevention systems, and antivirus solutionsinto a flexible resource set through virtualization and softwaredefined technologies. This article delves into the relevant concepts, advantages, typical scheduling algorithms, and future development directions of secure resource virtualization. This article provides a detailed analysis of the composition devices and functional characteristics of virtualized security resources, and points out their advantages in resource virtualization and sharing, flexible expansion, unified management, and deep integration with cloud environments. In terms of scheduling algorithms, this article studies various typical virtualization security resource and task scheduling strategies, such as coral reef task scheduling algorithm, immune genetic algorithm, improved pollen transmission algorithm, and improved algorithm based on Pareto optimal theory, and explores their advantages and applicable scenarios. The article looks forward to the future development direction of security resource virtualization, The aim is to provide reference for further optimization configuration and cost control of security resource virtualization, and promote more efficient and stable development in the field of cloud computing under the premise of ensuring security.

Key words: virtual, security resource, task scheduling, resource scheduling, optimization algorithm

中图分类号: