博碩士論文 101552015 詳細資訊

以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:18 、訪客IP:
姓名 孫敬智(Ching-chih Sun)  查詢紙本館藏   畢業系所 資訊工程學系在職專班
論文名稱 基於Hypervisor結構下的惡意網站封鎖機制
(An Automatic Malicious Website Blocking Mechanism Based on a Hypervisor Architecture)
★ USB WORM KILLER: Cure USB Flash Worms Through a USB Flash Worm★ Discoverer- Rootkit即時偵測系統
★ 一項Android手機上詐騙簡訊的偵測與防禦機制★ SRA系統防禦ARP欺騙劫持路由器
★ 針對遠端緩衝區溢位攻擊之自動化即時反擊系統★ 即時血清系統: 具攻性防壁之自動化蠕蟲治癒系統
★ DNSPD: Entrap Botnets Through DNS Cache Poisoning Detection★ TransSQL: A Translation and Validation-based Solution for SQL-Injection Attacks
★ A Spam Mail-based Solution for Botnet Detection and Network Bandwidth Protection★ Shark: Phishing Information Recycling from Spam Mails
★ FFRTD: Beat Fast-Flux by Response Time Differences★ Antivirus Software Shield against Antivirus Terminators
★ MAC-YURI : My ACcount, YoUr ResponsIbility★ KKBB: Kernel Keylogger Bye-Bye
★ CIDP Treatment: An Innovative Mobile Botnet Covert Channel based on Caller IDs with P8 Treatment★ PrivacyGuard:A Kernel-based Solution to Enhance the User Privacy When Using Private Browsing
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 (2019-7-1以後開放)
摘要(中) 由於雲端系統帶來了有效降低成本、整合化統一便利管理、硬體資源最佳化運用,以及系統運作彈性與效能有效提升等好處,促使許多公司企業甚至學院,或多或少都會建構雲端系統與運用雲端服務、運算等相關技術。而在雲端所帶來便利與高彈性之餘,相對的產生了資訊安全防護相關議題,也因為隨著虛擬化技術的運用與廣泛的佈建,企業的資安政策將面臨新的挑戰與轉變。在系統環境的防護上虛擬系統引用虛擬交換器,來處理虛擬機之間的網路封包傳遞,使得網路架構在本質上與傳統實體環境有所差異。此外,既使在虛擬環境中已有妥善的防護設備,仍然難以防範人為操作所帶來的資安問題,例如任意下載與存取各類檔案或資料。
本論文將會依序介紹雲端系統中最常應用的虛擬化技術及其類型,並且也會說明Hypervisor在虛擬化技術中所扮演的角色與其運作架構,同時亦是利用Hypervisor架構中預設提供的virtual switch,結合本研究所開發的程式模組,來建構一項自動化運作機制,輔助virtual switch側錄與防護功能,以期望能夠對虛擬機操作行為進行有效的監控與防禦,達成提高雲端虛擬化環境的系統安全防護。
摘要(英) As the cloud system brings benefits which effectively reduce costs , integrate , manage system , optimize the using of hardware resources, enhance the flexibility and performance of the system. Prompting many companies and even college more or less construct and use cloud service , cloud computing and related technologies. Although a cloud system brings convenience and higher-flexibility, simultaneously generates information security protection related issues. Also because virtualization technologies are used , disposed and built extensively. Enterprise information security policies will face new challenges and changes. Virtual environments launch a default virtual switch to handle network packets transmission between virtual machines that make the network architecture different from traditional physical network environments essentially. Moreover, there have been an appropriate protection equipment in the virtual environment, but still difficult to guard against the security issue caused by human operation. For example, people arbitrarily download and access each kind of file or data.
This paper will introduce the most popular virtualization technology and type in the cloud system , also describe what Hypervisor play the role in virtualization technology and its operation structure. Simultaneously, we will also use the default virtual switch in Hypervisor structure to combine with program modules of our development to construct an automated operation mechanism. It will assist the virtual switch to sniff and protect. We expect to monitor and defense behavior of operations on virtual machines effectively and reach to improve system security of cloud virtualized environment.
關鍵字(中) ★ 惡意網站
★ 封鎖機制
關鍵字(英) ★ Hypervisor
論文目次 摘要 i
誌謝 iv
目錄 v
圖目錄 vii
表目錄 ix
一、 前言 1
1-1 研究動機與背景 1
1-2 研究目的 3
1-3 研究範圍 4
1-4 文獻與現況探討 5
1-4-1 虛擬化技術與架構介紹 5
1-5 名詞定義 14
二、 系統設計 15
2-1 系統環境設定與規劃 15
2-2 系統程式模組元件 17
2-2-1 Squid Proxy 18
2-2-2 檔案異動監控模組(File Change Logger) 19
2-2-3 檔名還原模組(File Name Restorer) 19
2-2-4封包監聽與記錄模組(Packet Sniffer Logger) 23
2-2-5 黑名單產生模組(Black List Generator) 24
三、 實驗環境 27
3-1 實驗環境 27
3-2 實驗環境配置 27
四、 實驗執行與結果 28
4-1 一般網站直接下載行為 28
4-2 SSL加密網站下載 30
4-3 SSL 模擬JavaScript auto-download 31
五、 相關研究 33
5-1 防毒架構與網站信譽 33
5-2 惡意網站偵測與防護 34
六、 結論與未來展望 36
參考文獻 38
參考文獻 ﹝1﹞Global Enterprise Server Virtualization Market 2012-2016,2012年12月20日,取自http://www.technavio.com/report/global-server-virtualization-market-2012-2016。
﹝2﹞吳依恂,虛擬化安全導入-2 虛擬網路安全市場待開發 組織架構先調整,資安人科技網,2011年11月28日,取自http://www.informationsecurity.com.tw/article/article_detail.aspx?tv=&aid=6485&pages=1。
﹝3﹞iThome 2014年CIO大調查(中)2014年伺服器虛擬化需求分析,2014年3月11日,取自http://www.ithome.com.tw/article/85755。
〔6〕Check Point Security Report 2014,13 May 2014,http://www.checkpoint.com/documents/ebooks/security-report-2014/index.html#I。
〔7〕趙驚人,Windows Server 2008 R2虛擬化技術Hyper-V R2,初版,精誠資訊,台北市,民國九十九年七月。
〔8〕行政院經濟建設委員會資訊小組,「桌面虛擬化之可行性探討」,政府機關資訊通報第 298 期,2012年8月。
〔11〕Adobe & Java Make Windows Insecure,AVTEST,4th December 2013,http://www.av-test.org/en/news/news-single-view/adobe-java-make-windows-insecure/。
〔12〕 Davide Canali,Marco Cova,Giovanni Vigna and Christopher Kruegel,“ Prophiler: A Fast Filter for the Large-Scale Detection of Malicious Web Pages”,WWW ′11 Proceedings of the 20th international conference on World wide web,Pages 197-206,Hyderabad,India,March 28–April 1,2011
〔13〕 Gianluca Stringhini,Christopher Kruegel and Giovanni Vigna,“ Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages”,CCS ′13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security,Pages 133-144,Berlin,Germany,November 4–8,2013
〔14〕 Luca Invernizzi,Paolo Milani Comparetti,Stefano Benvenuti,Christopher Kruegel,Marco Cova and Giovanni Vigna,“ EVILSEED: A Guided Approach to Finding Malicious Web Pages”,2012 IEEE Symposium on Security and Privacy,Pages 428-442,San Francisco,CA,May 20–23,2012
〔15〕Jeff Alexander,Networking and Windows Server 2008 R2 Hyper-V: Deployment Considerations,2010,http://ecn.channel9.msdn.com/o9/2010/Australia/pptx/svr306.pptx。
〔16〕Diego Perez-Botero、Jakub Szefer and Ruby B. Lee,
"Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers",Cloud Computing’13 Proceeding of the 2013 inernational workshop on Security in cloud computing,pp. 3-10,May 8 2013。
〔17〕鄭進興、潘得源,「建置VMware虛擬化平台Hypervisor based防護機制」,第二十三屆全國資訊安全會議(CISC 2013),276-283頁,南臺科技大學資訊工程系,台南市,2013年 05 月 23 日。
〔19〕雲端運算:虛擬化類別,TechNet Magazine,2012年2月,取自http://technet.microsoft.com/zh-tw/magazine/hh802393.aspx。
〔21〕Feature: Squid-in-the-middle SSL Bump,22th December 2013,http://wiki.squid-cache.org/Features/SslBump。
〔22〕Squid configuration directive ssl_bump,http://www.squid-cache.org/Doc/config/ssl_bump/。
〔24〕SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN CLOUD COMPUTING V3.0,Cloud Security Alliance,2011,https://downloads.cloudsecurityalliance.org/initiatives/guidance/csaguide.v3.0.pdf。
〔25〕Hyper-V 虛擬化技術(Hyper-V 2.0),2012年4月9日,取自http://www.dotblogs.com.tw/daniel07793/archive/2012/04/09/71362.aspx。
〔26〕Yinqian Zhang,Ari Juels,Michael K. Reiter and Thomas Ristenpart,“ Cross-VM Side Channels and Their Use to Extract Private Keys”,CCS ′12 Proceedings of the 2012 ACM conference on Computer and communications security,pp. 305-316,October 2012.
〔27〕雲端運算將帶來新的資訊安全挑戰,TREND 雲端運算安全趨勢BLOG部落格,2010年1月4日,取自http://domynews.blog.ithome.com.tw/post/1252/62664。
指導教授 許富皓(Fu-Hau Hsu) 審核日期 2014-8-5
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明