博碩士論文 101423024 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:9 、訪客IP:44.210.21.70
姓名 卿韻亭(Yun-ting Ching)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 基於Windows API之實驗狀態回饋機制研究 ─以CSEP雲端安全實驗平台為例
(On the Research of Windows API-based Experimental State Feedback Mechanism ─A Case Study on the Cloud Security Experimental Platform)
相關論文
★ 應用數位版權管理機制於數位影音光碟內容保護之研究★ 以應用程式虛擬化技術達成企業軟體版權管理之研究
★ 以IAX2為基礎之網頁電話架構設計★ 應用機器學習技術協助警察偵辦詐騙案件之研究
★ 擴充防止詐欺及保護隱私功能之帳戶式票務系統研究-以大眾運輸為例★ 網際網路半結構化資料之蒐集與整合研究
★ 電子商務環境下網路購物幫手之研究★ 網路安全縱深防護機制之研究
★ 國家寬頻實驗網路上資源預先保留與資源衝突之研究★ 以樹狀關聯式架構偵測電子郵件病毒之研究
★ 考量地區差異性之隨選視訊系統影片配置研究★ 不信任區域網路中數位證據保留之研究
★ 入侵偵測系統事件說明暨自動增加偵測規則之整合性輔助系統研發★ 利用程序追蹤方法關聯分散式入侵偵測系統之入侵警示研究
★ 一種網頁資訊擷取程式之自動化產生技術研發★ 應用XML/XACML於工作流程管理系統之授權管制研究
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著資訊與網路的蓬勃發展,許多個人化的服務提供也隨之興起,衍伸而出的是許多商機。除了電子商務領域中的個人化服務推薦的應用之外,亦有個人化數位學習的應用。而這些個人化服務的提供最首要的一件事情就是「獲得使用者於使用服務時的使用動作/操作行為」。在針對如何獲得使用者操作行為的這個領域中,目前在學術上與網路上也已經有許多關於狀態獲取與辨識的文獻與機制,但這些狀態辨識機制卻仍不夠全面性地辨識使用者操作時所點選的項目資訊。
為了能夠更全面地辨識使用者操作時所點選的項目資訊,本研究提出實驗狀態回饋機制(Experimental State Feedback Mechanism, ESFM),能夠即時捕捉使用者在Windows作業系統中的操作動作。並以CSEP雲端安全實驗平台為例,CSEP是一個具有互動式教學的數位學習平台。故可利用ESFM來捕捉使用者在虛擬實驗主機上的操作動作,進而回饋實驗的下一步驟給CSEP,讓使用者能夠一步步地接續進行爾後的實驗。
本研究的實驗狀態回饋機制(ESFM)經實驗證明可適切地進行捕捉使用者的動作以及辨識視窗與元件資訊,且對於系統效能的影響很低,也能夠改善目前CSEP案例中所使用的Sikuli機制的不足。因此本研究的ESFM可在不影響使用者操作的情況下,獲得使用者在虛擬實驗主機上操作動作的資訊,並提供CSEP未來在設計案例時所用。
摘要(英) With the rapid development of Internet, many personalized services also rise and bring many business opportunities. In addition to the application of personalized service recommendation in the field of e-commerce, some application of personal e-learning also exists in the field of providing personalized services. While providing these personalized services, the most important thing is "To get user′s action behavior when they using the service." There are many academic literatures and mechanisms about how do we access and identify user′s action behavior, but this information is still not enough to show the details of user′s operating behavior.
In order to identify user′s action behavior more accurately, our study presents the Experimental Status Feedback Mechanism (ESFM). ESFM could instantly capture user′s action on Windows OS. Our study use Cloud Security Experimental Platform (CSEP) as an example, CSEP is an e-learning platform and provided with interactive teaching. Therefore, through ESFM could capture user′s action when they do some operations on the virtual machine. When ESFM capture this information, it will send this information to CSEP server, allowing users to follow steps and finishing their experiments.
The ESFM we proposed has been proven that it can aptly capture the user′s actions and recognize the window and widgets information. ESFM not only has lower impact on system performance, but improve the Sikuli mechanism used in CSEP experiments. Therefore, ESFM could capture the user′s operation without affecting them on the virtual machine and used for future design of CSEP experiments.
關鍵字(中) ★ Windows API
★ API Hooking
★ 狀態回饋
★ 雲端安全實驗平台
關鍵字(英) ★ Windows API
★ API Hooking
★ State Feedback
★ Cloud Security Experimental Platform
論文目次 中文摘要 i
英文摘要 ii
誌謝 iii
目錄 iv
圖目錄 vi
表目錄 viii
第一章 緒論 1
1-1 研究背景 1
1-2 研究動機與目的 4
1-3 研究貢獻 5
1-4 章節架構 5
第二章 相關研究 6
2-1 實驗狀態回饋的定義 6
2-2 狀態獲取與回饋 7
2-2-1 虛擬機器的狀態獲取與回饋 8
2-2-2 使用者的動作攔截與記錄 10
2-3 相關機制 13
2-4 小結 16
第三章 實驗狀態回饋機制 18
3-1 機制設計與架構流程 18
3-1-1 實驗狀態回饋機制設計 18
3-1-2 實驗狀態回饋機制流程與擴充方式 25
3-1-3 實驗狀態回饋機制的狀態變化 29
3-2 軟體品質評估 31
3-2-1 功能適用性-正確性和適當性 32
3-2-2 可攜性-適應性 36
第四章 實驗設計與結果討論 40
4-1 實驗設計 40
4-1-1 實驗一:API Hooking對於系統效能的影響 40
4-1-2 實驗二:ESFM對於CSEP案例實作的影響 41
4-2 實驗結果與討論 42
4-2-1 實驗一:API Hooking對於系統效能的影響 42
4-2-2 實驗二:ESFM對於CSEP案例實作的影響 47
4-3 小結 48
第五章 結論與未來研究 49
5-1 研究結論與貢獻 49
5-2 研究限制 49
5-3 未來研究 50
參考文獻 53
參考文獻 [1] 劉旭哲,「互動式線上教學之互動點推薦機制研究」,國立中央大學資訊管理學系碩士論文,2012。
[2] 黃瀞瑩,「一個提供彈性虛擬資料中心的雲端服務平台」,國立中央大學資訊工程學系碩士論文,2011。
[3] Y. Wang, J. Lin, M. Annavaram, Q. A. Jacobson, J. Hong, B. Krishnamachari, and N. Sadeh, “A Framework of Energy Efficient Mobile Sensing for Automatic User State Recognition,” in Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, New York, NY, USA, pp. 179–192, 2009.
[4] S. Keates, F. Hwang, P. Langdon, P. J. Clarkson, and P. Robinson, “Cursor Measures for Motion-impaired Computer Users,” in Proceedings of the Fifth International ACM Conference on Assistive Technologies, New York, NY, USA, pp. 135–142, 2002.
[5] D. R. Kaufman, V. L. Patel, C. Hilliman, P. C. Morin, J. Pevzner, R. S. Weinstock, R. Goland, S. Shea, and J. Starren, “Usability in the Real World: Assessing Medical Information Technologies in Patient’s Homes,” J Biomed. Inform., Vol. 36, No. 1/2, pp. 45–60, Feb. 2003.
[6] B. Cannon and E. Wohlstadter, “Enforcing Security for Desktop Clients Using Authority Aspects,” in Proceedings of the 8th ACM International Conference on Aspect-oriented Software Development, New York, NY, USA, pp. 255–266, 2009.
[7] V. K. Santhalia and S. Singh, “Design and Development of a Desktop Monitoring System,” in Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, New York, NY, USA, pp. 620–625, 2012.
[8] R. Atterer, M. Wnuk, and A. Schmidt, “Knowing the User’s Every Move: User Activity Tracking for Website Usability Evaluation and Implicit Interaction,” in Proceedings of the 15th International Conference on World Wide Web, New York, NY, USA, pp. 203–212, 2006.
[9] Y.M. Chen, C.E. Chuang, H.C. Liu, C.Y. Ni, and C.T. Wang, “Using Agent in Virtual Machine for Interactive Security Training,” in Security Technology, T. Kim, H. Adeli, W. Fang, J. G. Villalba, K. P. Arnett, and M. K. Khan, Eds. Springer Berlin Heidelberg, pp. 65–74, 2011.
[10] S.J. Chen, J.Y. Huang, C.T. Huang, and W.J. Wang, “SAMEVED: A System Architecture for Managing and Establishing Virtual Elastic Datacenters,” Int J Grid High Perform Comput, Vol. 5, No. 2, pp. 27–42, Apr. 2013.
[11] U. Kukreja, W. E. Stevenson, and F. E. Ritter, “RUI: Recording user input from interfaces under Windows and Mac OS X,” Behav. Res. Methods, Vol. 38, No. 4, pp. 656–659, Nov. 2006.
[12] J. Alexander, A. Cockburn, and R. Lobb, “AppMonitor: A tool for recording user actions in unmodified Windows applications,” Behav. Res. Methods, Vol. 40, No. 2, pp. 413–421, May 2008.
[13] K. Mera and T. Ichimura, “Classification of EGC output and Mental State Transition Network using Self Organizing Map,” in Proceedings of the 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 3155–3160, 2011.
[14] C. Epp, M. Lippold, and R. L. Mandryk, “Identifying Emotional States Using Keystroke Dynamics,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY, USA, pp. 715–724, 2011.
[15] N. Bidargaddi, A. Sarela, and I. Korhonen, “Physiological state characterization by clustering heart rate, heart rate variability and movement activity information,” in Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2008. EMBS 2008, pp. 1749–1752, 2008.
[16] T. Tani and S. Yamada, “User state identification through desktop interaction,” in Proceedings of the 2012 Joint 6th International Conference on Soft Computing and Intelligent Systems (SCIS) and 13th International Symposium on Advanced Intelligent Systems (ISIS), pp. 395–398, 2012.
[17] T. Ji, P. Tuo-Yu, Z. Zhen-Min, and L. Kai, “A personalized recommendation model based on the user-state awareness,” in Proceedings of the 1st IEEE Symposium on Web Society, 2009. SWS ’09, pp. 10–13, 2009.
[18] F. Zhang, J. Chen, H. Chen, and B. Zang, “CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization,” in Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, New York, NY, USA, pp. 203–216, 2011.
[19] R. Ando and K. Suzaki, “A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation,” in Security Technology, T. Kim, H. Adeli, W. Fang, J. G. Villalba, K. P. Arnett, and M. K. Khan, Eds. Springer Berlin Heidelberg, pp. 215–227, 2011.
[20] A. Hurst, S. E. Hudson, and J. Mankoff, “Automatically Identifying Targets Users Interact with During Real World Tasks,” in Proceedings of the 15th International Conference on Intelligent User Interfaces, New York, NY, USA, pp. 11–20, 2010.
[21] T. Yeh, T.-H. Chang, and R. C. Miller, “Sikuli: Using GUI Screenshots for Search and Automation,” in Proceedings of the 22Nd Annual ACM Symposium on User Interface Software and Technology, New York, NY, USA, pp. 183–192. , 2009
[22] “以電子商務推薦系統打造個人化數位學習服務.” [Online]. Available: http://newsletter.teldap.tw/news/InsightReportContent.php?nid=4653&lid=533.
[23] “How can we deliver more personalized service to our guests?” [Online]. Available: http://www.sas.com/content/dam/SAS/en_us/doc/solutionbrief/deliver-more-personalized-service-to-guests-105156.pdf.
[24] “中央大學雲端安全實驗平台.” [Online]. Available: http://csep.mgt.ncu.edu.tw/.
[25] “Hooks.” [Online]. Available: http://msdn.microsoft.com/en-us/library/windows/desktop/ms632589(v=vs.85).aspx.
[26] “The GTK+ Project.” [Online]. Available: http://www.gtk.org/.
[27] “Oxford Learner’s Dictionaries.” [Online]. Available: http://www.oxfordlearnersdictionaries.com/.
[28] “Sikuli Script.” [Online]. Available: http://www.sikuli.org/.
[29] “Introducing Spy++.” [Online]. Available: http://msdn.microsoft.com/en-us/library/dd460756.aspx.
[30] “UI Automation.” [Online]. Available: http://msdn.microsoft.com/en-us/library/windows/desktop/ee684009(v=vs.85).aspx.
[31] “WinSpy++ 1.7.” [Online]. Available: http://www.catch22.net/software/winspy-17.
[32] “MS Spy++ style Window Finder.” [Online]. Available: http://www.codeproject.com/Articles/1698/MS-Spy-style-Window-Finder.
[33] “Penetration Testing Software, Pen Testing Security,” Metasploit. [Online]. Available: http://www.metasploit.com/.
[34] “Home Keylogger Free Edition.” [Online]. Available: http://www.kmint21.com/keylogger/.
[35] “ISO/IEC 25010:2011.” [Online]. Available: http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=35733.
[36] “User mode and kernel mode.” [Online]. Available: http://msdn.microsoft.com/en-us/library/windows/hardware/ff554836(v=vs.85).aspx.
[37] “Windows API Index.” [Online]. Available: http://msdn.microsoft.com/en-us/library/windows/desktop/ff818516(v=vs.85).aspx.
[38] “SetWindowsHookEx function.” [Online]. Available: http://msdn.microsoft.com/en-us/library/windows/desktop/ms644990(v=vs.85).aspx.
[39] “Virtual-Key Codes.” [Online]. Available: http://msdn.microsoft.com/en-us/library/windows/desktop/dd375731(v=vs.85).aspx.
[40] “Control Library.” [Online]. Available: http://msdn.microsoft.com/en-us/library/windows/desktop/bb773169(v=vs.85).aspx.
[41] “RARLAB.” [Online]. Available: http://www.rarlab.com/download.htm.
[42] “pcman - OpenFoundry.” [Online]. Available: http://www.openfoundry.org/of/projects/744.
指導教授 陳奕明(Yi-ming Chen) 審核日期 2014-7-25
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明