面向可控云計(jì)算的惡意行為分析與管控關(guān)鍵技術(shù)研究
[Abstract]:Cloud computing brings benefits to people's lives at the same time, its own rich resources, ubiquitous access and other features are easy to be abused by attackers to expand their attack capabilities and scope. The uncontrollability of cloud computing hurts the reputation of cloud service providers on the one hand, and greatly damages the interests of puppet cloud tenants and attack victims on the other. Therefore, it is important to study effective methods to guarantee the controllability of cloud computing. At present, compared with the protection of data in the cloud and other security studies, there are still less work to address this challenge, mainly divided into two parts, one part of the abuse of botCloud and other forms of detection, however, in addition to relatively few types of detection, how to implement abuse control research has not been carried out. Part of the work attempts to migrate malicious behavior detection and control methods in the common network environment to the cloud computing environment, such as using firewalls or intrusion detection devices to monitor the real-time network traffic of tenants, although some results have been achieved, but relatively limited. For example, cloud service providers can effectively obtain a variety of data information carried by hardware resources within their control area, but it is difficult to obtain host behavior data in the ordinary network environment; cloud computing centers are generally large-scale and require high accuracy of malicious behavior identification, while the data to be processed in the ordinary network environment is relatively small; For example, cloud service providers seek to maximize profits on the basis of limited resources, while security workers in general network environments seek to minimize security risks first. These differences, on the one hand, hinder the migration of relevant measures in the general environment to the cloud, on the other hand, also to design new and meet the controllable needs of cloud computing centers. Based on the above understanding, aiming at the uncontrollable behavior of the tenants in cloud computing platform, this paper systematically studies the three dimensions of malicious behavior: data acquisition, analysis and control, and constructs a secure and controllable cloud computing platform, which provides technical support for cloud computing service providers and third-party supervision. In this paper, the main work and innovations are as follows: (1) In-depth study of cloud computing center-oriented malicious behavior data acquisition methods. Cloud computing using computational virtualization, network virtualization and storage virtualization technology to achieve resilient scalability, for this reason, this paper in-depth study of system virtualization-oriented data acquisition methods - Virtual From the point of view of technology implementation, this paper systematically analyzes the four modes of virtual machine introspection technology crossing the semantic gap and the problems faced by each mode, which lays a theoretical and practical foundation for the subsequent design of malicious behavior analysis and control scheme for controllable cloud computing. (2) In order to improve the accuracy of malicious behavior identification and reduce the number of cloud. The impact of tenant experience objectively requires a larger set of training samples; at the same time, the large-scale cloud computing center produces a large number of system call sequences that need real-time analysis. Therefore, this paper proposes a distributed online process behavior analysis method to meet the needs of malicious behavior analysis in controllable cloud computing. First, based on the random projection tree, this method divides the sample behavior feature dataset into sub-datasets with good roundness. Then, on the premise of ensuring local proximity, each sub-dataset is placed on a structured P2P node, and each node is responsible for it. The experimental results show that, besides high routing efficiency, the recall rate of K-nearest neighbor results within three hops can reach more than 75%. (3) The resource consumption of malicious behavior control technology in general network environment is high. This paper proposes a fine-grained control technology for application-level malicious software, and designs and implements a pTrace system which can control malicious software directly under the background of controlling the DDoS attack source in the cloud. The pTrace system reduces the response resource consumption and is easy to be adopted by cloud service providers. VM introspection and packet capture technology acquire malicious behavior data, identify the source address information of attack stream and attack stream, then trace the source of malicious software accurately according to the source address information, thus realizing the direct control of malicious process. The experimental results show that the system can trace malicious processes accurately in milliseconds. (4) In order to control the ability of malicious software to abuse cloud resources, this paper proposes and designs a malicious behavior restriction scheme based on network resource isolation. A flexible network resource isolation scheme for cloud computing centers is designed based on Openstack. On this basis, an access control strategy between multi-tenant virtual networks is designed.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級別】:博士
【學(xué)位授予年份】:2016
【分類號】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 張國平;;基于SDN和Overlay的云計(jì)算數(shù)據(jù)中心網(wǎng)絡(luò)[J];中國新通信;2015年03期
2 毛曉蛟;楊育彬;;一種基于子空間學(xué)習(xí)的圖像語義哈希索引方法[J];軟件學(xué)報(bào);2014年08期
3 云安全聯(lián)盟;王旭東;;2013年云計(jì)算的9大威脅[J];通訊世界;2013年08期
4 孟小峰;慈祥;;大數(shù)據(jù)管理:概念、技術(shù)與挑戰(zhàn)[J];計(jì)算機(jī)研究與發(fā)展;2013年01期
5 項(xiàng)國富;金海;鄒德清;陳學(xué)廣;;基于虛擬化的安全監(jiān)控[J];軟件學(xué)報(bào);2012年08期
6 姜輝;楊峰;段海新;;Rootkit隱藏技術(shù)與檢測方法研究[J];小型微型計(jì)算機(jī)系統(tǒng);2012年05期
7 馮天樹;許學(xué)東;;Windows木馬的各種進(jìn)程隱藏技術(shù)及應(yīng)對策略[J];信息網(wǎng)絡(luò)安全;2011年10期
8 張顯;黎文偉;;基于多核平臺的數(shù)據(jù)包捕獲方法性能評估[J];計(jì)算機(jī)應(yīng)用研究;2011年07期
9 劉曉茜;楊壽保;郭良敏;王淑玲;宋滸;;雪花結(jié)構(gòu):一種新型數(shù)據(jù)中心網(wǎng)絡(luò)結(jié)構(gòu)[J];計(jì)算機(jī)學(xué)報(bào);2011年01期
10 劉寶旭;馬建民;池亞平;;計(jì)算機(jī)網(wǎng)絡(luò)安全應(yīng)急響應(yīng)技術(shù)的分析與研究[J];計(jì)算機(jī)工程;2007年10期
相關(guān)博士學(xué)位論文 前2條
1 林杰;面向服務(wù)監(jiān)控的可控云關(guān)鍵技術(shù)研究[D];北京郵電大學(xué);2015年
2 馮振乾;云計(jì)算數(shù)據(jù)中心的網(wǎng)絡(luò)帶寬隔離技術(shù)研究[D];國防科學(xué)技術(shù)大學(xué);2012年
相關(guān)碩士學(xué)位論文 前2條
1 黃全偉;基于N-Gram系統(tǒng)調(diào)用序列的惡意代碼靜態(tài)檢測[D];哈爾濱工業(yè)大學(xué);2009年
2 王旭樂;基于內(nèi)容的圖像檢索系統(tǒng)中高維索引技術(shù)的研究[D];華中科技大學(xué);2008年
,本文編號:2214615
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2214615.html