簡易檢索 / 詳目顯示

研究生: 陳怡臻
Chen, Yi-Chen
論文名稱: 雲端數位鑑識之分散式日誌傳輸系統
Distributed Log System in Cloud Digital Forensics
指導教授: 李忠憲
Li, Jung-Shian
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 56
中文關鍵詞: 雲端運算虛擬機器網路管理日誌系統無線感測網路
外文關鍵詞: Cloud Computing, Virtual Machines (VMs), Network Management, Log System, Wireless Sensor Networks
相關次數: 點閱:139下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 現今雲端運算蓬勃發展,隨著雲端中虛擬機器的增加,管理的難度也日漸增加,因此如何管理龐大虛擬機器,成為一項重要的課題。隨著個資法的建立,使人們越來越重視資訊安全的議題,因此可藉由分析蒐集到的日誌了解使用者的使用情況,若發生異常行為時,便可即時通報以掌握資訊安全。故如何在少量成本的情況下,設計一種機制,能簡單且快速的運用網路頻寬傳送大量的日誌封包,並且降低管理者的負擔,使管理者可以有效的維運並管理虛擬機器,為本論文研究之重點。因此本研究基於雲端平台,針對管理者蒐集大量日誌封包,設計日誌資料傳輸與彙整之機制,藉以改善分散式管理架構之日誌資料傳輸及彙整效能。藉由本研究所設計之架構,在傳輸的同時彙整日誌資料,除了可減少管理者彙整資料的時間,使管理者可即時掌握雲端環境並加以監控,亦可降低日誌資料在傳輸上的負載,使終端用戶可享受較佳的雲端服務。

    Cloud computing is a promising future. As number of VMs in the cloud increases, the management problem becomes crucial; thus, how to monitor enormous VMs is a critical study. Due to the establishment of Personal Information Protection Act, people stress more on the security–related topics. Hence, we can understand users’ usage conditions by analyzing the logs. If it’s unusual, it will be reported instantly to control the information security. The key point of this thesis is to design a distributed system efficiently to use the network bandwidth to transmit a large number of logs, and to reduce managers’ burdens for maintaining and managing VMs effectively with little extra costs. Therefore, according to the platform of cloud service, this study highlights manager collecting enormous logs, designs log transmission, integrates logs to make progress on the log transmission of distribution management architecture and evaluate the system performance. In the designed system, logs are transmitted and collected efficiently, this architecture not only saves the time to collect data that let the managers monitor the cloud environment in the meantime, but also reduces load of log transmission for monitoring cloud services.

    摘要 I ABSTRACT II 誌謝 III CONTENTS IV LIST OF TABLES V LIST OF FIGURES VI CHAPTER 1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 MOTIVATION 2 1.3 CONTRIBUTION 2 1.4 ORGANIZATION 2 CHAPTER 2 BACKGROUND & RELATED WORK 4 2.1 CLOUD COMPUTING 4 2.2 MANAGEMENT ARCHITECTURE 7 2.3 IN-NETWORK 9 2.4 LOG COLLECTION 11 CHAPTER 3 SYSTEM ARCHITECTURE 14 3.1 DEFINITION & ASSUMPTION 14 3.2 SCENARIO DESCRIPTION 16 3.3 PROPOSED METHOD 18 3.3.1 Poisson Distribution as Background Traffic Module 18 3.3.2 Beta Distribution as CPU Usage Module 20 3.3.3 Statistical methods 22 CHAPTER 4 PERFORMANCE EVALUATION 25 4.1 NO BACKGROUND TRAFFIC 27 4.2 CONSTANT BIT RATE AS BACKGROUND TRAFFIC MODULE 30 4.3 POISSON DISTRIBUTION AS BACKGROUND TRAFFIC MODULE 34 4.4 EXECUTION TIME FITTING 38 4.5 COMPUTING TIME 47 CHAPTER 5 DISCUSSION 49 CHAPTER 6 CONCLUSION AND FUTURE WORK 53 REFERENCES 54

    [1] C. Basescu, A. Carpen-Amarie, C. Leordeanu, A. Costan and G. Antoniu, “Managing data access on clouds: A generic framework for enforcing security policies,” IEEE International Conference on Advanced Information Networking and Applications, pp. 459-466, Mar. 2011.
    [2] C. H. Lin, C. T. Lu, Y. H. Chen, and J. S. Li, “Resource Allocation on Cloud Virtual Machines Based on Empirical Service Data Traces,” International Journal of Communication Systems, DOI: 10.1002/dac.2607, 2013.
    [3] Akhil Behl and Kanika Behl, “An Analysis of Cloud Computing Security Issues,” Information and Communication Technologies (WICT), World Congress on, pp.109-114, 2012.
    [4] P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” Special Publication 800-145, NIST, 2011.
    [5] Liang-Kuan Lee, “A Study of Network Blocking System Combined with Anti-Virus and IDS,” Thesis for Master of Science Department of Computer Science and Engineering Tatung University, 2009.
    [6] Liang-Kuan Lee, “A Study of Network Blocking System Combined with Anti-Virus and IDS,” Thesis, 2009.
    [7] William Stallings , “SNMP, SNMPv2, SNMPv3, and RMON 1 and 2 Third Edition, ” Addison-Wesley, 1998.
    [8] Pajic, M., “Topological Conditions for In-Network Stabilization of Dynamical Systems,” Selected Areas in Communications, IEEE Journal on Vol. 31, Iss. 4, pp. 794-807, 2013.
    [9] Jin Wang, “Data Gathering in Wireless Sensor Networks Through Intelligent compressive sensing,” Published in INFOCOM, Proceedings IEEE, pp.603-611, 2012.
    [10] Shah, V., “Efficient Flow Allocation Algorithms for In-Network Function Computation,” Global Telecommunications Conference IEEE, pp.1-6, 2011.
    [11] Haifeng Zheng, “Energy and Latency Analysis for In-network Computation with Compressive Sensing in Wireless Sensor Networks,” INFOCOM Proceedings IEEE, pp.2811-2815, 2012.
    [12] Chi-Tsun Cheng, “A Delay-Aware Network Structure for Wireless Sensor Networks With In-Network Data Fusion,” Sensors Journal, IEEE, pp.1622-1631, 2013.
    [13] Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, and Mariappan Rajaram, “Secure Logging As a Service—Delegating Log Management to the Cloud,” IEEE Systems Journal, Vol. 7, No. 2, JUNE 2013.
    [14] Moses Moyo, Hanifa.Abdullah, Rita C. Nienaber, “Information Security Risk Management in Small-Scale Organisations: A Case Study of Secondary Schools Computerised Information Systems,” Information Security for South Africa, 2013.
    [15] Zafar Jafarov, “Architecture of an Intelligent System for Information Security Management,” Application of Information and Communication Technologies, pp.1-3, 2013.
    [16] Ruoqing-Zhang, Zhiwei Chen, Yatao Yang and Zichen Li, “An efficient scheme for log integrity check in security monitoring system,” Smart and Sustainable City, pp.198-202, 2013.
    [17] Swati Chaudhari, Hitendra Chauhan, S.S. Tomar and Anil Rawat, “User and Device Tracking in Private Networks by Correlating Logs: A System for Responsive Forensic Analysis,” Fourth International Conference on Communication Systems and Network Technologies, pp.1142-1147, 2014.
    [18] Shengzhong Yuan Shengzhong Yuan, Wei Wang, “A Campus Network Security Emergency Response Technical System Based on Emergency Log,” 2nd International Conference on e-Business and Information System Security, pp. 1–3, May 2010.
    [19] K. E. Nawyn, “A Security Analysis of System Event Logging with Syslog,” SANS Institute, 2003.
    [20] P. Jackson, “Introduction to Expert Systems,” Addison-Wesley, 1986.
    [21] J. Stearley, “Towards Informatic Analysis of syslogs,” IEEE International Conference on Cluster Computing, pp. 309-318, 2004.
    [22] D. Lin and A. Squicciarini, “Data protection models for service provisioning in the cloud,” Proceeding of the 15th ACM symposium on Access control models and technologies, pp. 183-192, 2010.
    [23] J. Zhou, M. Heckman, B. Reynolds, A. Carlson and M. Bishop, “Modeling Network Intrusion Detection Alerts for Correlation,” ACM Transactions on Information and System Security, Vol. 10, No.1, pp. 1-31, 2007.
    [24] G. Spafford, “The Importance of Audit Logs,” Retrieved 2014/05/19 from http://www.datamation.com/columns/article.php/3578916/The-Importance-of-Audit-Logs.htm, 2006.
    [25] J. Case, M. Fedor, M. Schoffstall and J. Davin, “RFC 1157 - A Simple Network Management Protocol (SNMP),” IETF Network Working Group, 1990.
    [26] J. Schönwälder, “On the Impact of Security Protocols on the Performance of SNMP,” IEEE Transactions on Network and Service Management, Vol. 8, No. 1, pp. 52-64, 2011.
    [27] Arvind Giridhar and P. R. Kumar, “Toward a Theory of In-Network Computation in Wireless Sensor Networks,” Communications Magazine, IEEE, Vol. 44, Iss. 4, pp.98-107, 2006.
    [28] Kashi Venkatesh Vishwanath and Amin Vahdat “Evaluating Distributed Systems : Does Background Traffic Matter?,” Annual Technical Conference on Annual Technical Conference, pp.227-240, 2008.
    [29] Chia-Wei Chang “Performance Evaluation and Modelling based on Empirical Data Collection in Cloud Computing System,” 2013.
    [30] Gerald Keller, “Statistics for Management and Economics Abbreviated, 9th Edition,” SOUTH-WESTERN CENGAGE Learning, 2011.
    [31] “Coefficient of Determination (R-Squared) ,”Retrieved 2014/05/19 from http://www.mathworks.com/help/stats/coefficient-of-determination-r-squared.html
    [32] Rade Stanojevic, Robert N. Shorten, and Christopher M. Kellett, “Adaptive Tuning of Drop-Tail Buffers for Reducing Queuing Delays,” Communications Letters, IEEE, Vol.10, Iss. 7, pp.570-572, 2006.
    [33] “Request for Comments: 5424 (The Syslog Protocol) ,” Retrieved 2014/05/19 from http://tools.ietf.org/html/rfc5424
    [34] Jia Uddin and Jong Myon Kim, “Impact of Background Utilization and Background Traffic on the Foreground Applications in a Wide Area Network”, DOI: 10.1007/978-94-007-5699-1_92, 2012.

    無法下載圖示 校內:2019-07-24公開
    校外:不公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE