基于宣告式网络的安全溯源技术研究
发布时间:2018-05-16 22:12
本文选题:宣告式网络技术 + 网络溯源 ; 参考:《西安石油大学》2015年硕士论文
【摘要】:随着信息化技术的飞速发展,分布式系统也随之不断改进,已经从原先简单的本地网络到如今大规模的P2P网络和云计算平台,部署的节点成百上千,覆盖多个地区和管理域。由于系统规模的不断扩大,复杂度和风险性也日益变大,系统安全面临前所未有的挑战。系统管理者迫切需要通过可靠的网络举证技术来帮助解决故障发现、系统调试、行为问责和损害评估等问题。网络溯源举证技术就是指通过技术手段,将网络状态变化、网络行为以及应用行为等追溯到发起者,追踪问题源头,并为采取法律措施提供有效证据。本文叙述了项目的背景、意义及目标,介绍了互联网发展与网络安全、分布式系统、宣告式网络以及网络溯源方法等相关技术,从系统需求分析、基于宣告式网络溯源系统的设计和Witness系统实现几方面对该系统实现过程进行了详细介绍,研究了云平台架构、虚拟化服务器架构、溯源信息的查询、维护及网络安全溯源模型等问题,最后展示了控制面板、资源、分析、管理等4个模块。Witness软件基于Java语言开发,整个软件分为Server、Agent和Database三个部分,其中Server从Agent端获取软件信息列表和标准数据,并保存在数据库里,并且提供了访问模型。软件整体采用B/S架构,是以系统服务的形式工作运行的,能很好地在Windows和Linux系统平台下运行,本软件实际应用在基于Windows操作系统的虚拟云平台上,通过将Agent寄主安装在云平台上的多个代理终端上,来负责收集数据信息,通过输入相应网址进入Witness主页来实时观测相关数据变化、警报生成事件和其他资源。
[Abstract]:With the rapid development of information technology, the distributed system has also been improved. From the original simple local network to the large-scale P2P network and cloud computing platform, the nodes deployed over hundreds of thousands, covering a number of regions and management domains. The system managers urgently need to help solve problems such as fault discovery, system debugging, behavior accountability and damage assessment through reliable network proof technology. Network tracing technology means tracing the change of network state, network behavior and application behavior to the initiator through technical means. Tracing the source of the problem and providing effective evidence for legal measures. This paper describes the background, significance and objectives of the project. It introduces the related technologies of Internet development and network security, distributed system, declarative network and network tracing method, from system requirement analysis, design and Witness system based on declarative network traceability system. The realization process of the system is introduced in detail, and the problems of cloud platform architecture, virtual server architecture, traceability information query, maintenance and network security traceability model are studied. At last, the 4 modules of.Witness software are developed based on the Java language, such as control panel, resource, analysis and management, and the whole software is divided into Server, Agent and Database three parts, in which Server obtains the software information list and standard data from the Agent side, and saves it in the database, and provides the access model. The software uses B/S architecture as a whole and runs in the form of system service. It can run well under the Windows and Linux system platform. This software is actually applied to W based on W. On the virtual cloud platform of the indows operating system, by installing the Agent host on multiple proxy terminals on the cloud platform, it is responsible for collecting data information and entering the Witness home page by entering the corresponding URL to observe the change of the related data in real time, the alarm generation and other resources.
【学位授予单位】:西安石油大学
【学位级别】:硕士
【学位授予年份】:2015
【分类号】:TP393.08
【参考文献】
相关期刊论文 前7条
1 肖军;云晓春;张永铮;;随机伪造源地址分布式拒绝服务攻击过滤[J];软件学报;2011年10期
2 杨坤;杨庚;;关于无线传感器网络中溯源方法的分析[J];计算机技术与发展;2011年07期
3 费洪晓;李文兴;覃思明;李钦秀;;一种动-静态结合的概率包标记IP追踪方案[J];计算机工程与应用;2011年09期
4 荆一楠;王雪平;肖晓春;张根度;;一种无日志的快速DDoS攻击路径追踪算法[J];小型微型计算机系统;2007年09期
5 闫巧,吴建平,江勇;网络攻击源追踪技术的分类和展望[J];清华大学学报(自然科学版);2005年04期
6 丁丽萍,王永吉;计算机取证的相关法律技术问题研究[J];软件学报;2005年02期
7 李强;汪仲谦;周富成;;DDoS攻击的分析与对策[J];军事通信技术;2002年02期
,本文编号:1898629
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/1898629.html