面向可控云计算的恶意行为分析与管控关键技术研究
[Abstract]:Cloud computing brings benefits to people's lives at the same time, its own rich resources, ubiquitous access and other features are easy to be abused by attackers to expand their attack capabilities and scope. The uncontrollability of cloud computing hurts the reputation of cloud service providers on the one hand, and greatly damages the interests of puppet cloud tenants and attack victims on the other. Therefore, it is important to study effective methods to guarantee the controllability of cloud computing. At present, compared with the protection of data in the cloud and other security studies, there are still less work to address this challenge, mainly divided into two parts, one part of the abuse of botCloud and other forms of detection, however, in addition to relatively few types of detection, how to implement abuse control research has not been carried out. Part of the work attempts to migrate malicious behavior detection and control methods in the common network environment to the cloud computing environment, such as using firewalls or intrusion detection devices to monitor the real-time network traffic of tenants, although some results have been achieved, but relatively limited. For example, cloud service providers can effectively obtain a variety of data information carried by hardware resources within their control area, but it is difficult to obtain host behavior data in the ordinary network environment; cloud computing centers are generally large-scale and require high accuracy of malicious behavior identification, while the data to be processed in the ordinary network environment is relatively small; For example, cloud service providers seek to maximize profits on the basis of limited resources, while security workers in general network environments seek to minimize security risks first. These differences, on the one hand, hinder the migration of relevant measures in the general environment to the cloud, on the other hand, also to design new and meet the controllable needs of cloud computing centers. Based on the above understanding, aiming at the uncontrollable behavior of the tenants in cloud computing platform, this paper systematically studies the three dimensions of malicious behavior: data acquisition, analysis and control, and constructs a secure and controllable cloud computing platform, which provides technical support for cloud computing service providers and third-party supervision. In this paper, the main work and innovations are as follows: (1) In-depth study of cloud computing center-oriented malicious behavior data acquisition methods. Cloud computing using computational virtualization, network virtualization and storage virtualization technology to achieve resilient scalability, for this reason, this paper in-depth study of system virtualization-oriented data acquisition methods - Virtual From the point of view of technology implementation, this paper systematically analyzes the four modes of virtual machine introspection technology crossing the semantic gap and the problems faced by each mode, which lays a theoretical and practical foundation for the subsequent design of malicious behavior analysis and control scheme for controllable cloud computing. (2) In order to improve the accuracy of malicious behavior identification and reduce the number of cloud. The impact of tenant experience objectively requires a larger set of training samples; at the same time, the large-scale cloud computing center produces a large number of system call sequences that need real-time analysis. Therefore, this paper proposes a distributed online process behavior analysis method to meet the needs of malicious behavior analysis in controllable cloud computing. First, based on the random projection tree, this method divides the sample behavior feature dataset into sub-datasets with good roundness. Then, on the premise of ensuring local proximity, each sub-dataset is placed on a structured P2P node, and each node is responsible for it. The experimental results show that, besides high routing efficiency, the recall rate of K-nearest neighbor results within three hops can reach more than 75%. (3) The resource consumption of malicious behavior control technology in general network environment is high. This paper proposes a fine-grained control technology for application-level malicious software, and designs and implements a pTrace system which can control malicious software directly under the background of controlling the DDoS attack source in the cloud. The pTrace system reduces the response resource consumption and is easy to be adopted by cloud service providers. VM introspection and packet capture technology acquire malicious behavior data, identify the source address information of attack stream and attack stream, then trace the source of malicious software accurately according to the source address information, thus realizing the direct control of malicious process. The experimental results show that the system can trace malicious processes accurately in milliseconds. (4) In order to control the ability of malicious software to abuse cloud resources, this paper proposes and designs a malicious behavior restriction scheme based on network resource isolation. A flexible network resource isolation scheme for cloud computing centers is designed based on Openstack. On this basis, an access control strategy between multi-tenant virtual networks is designed.
【学位授予单位】:北京邮电大学
【学位级别】:博士
【学位授予年份】:2016
【分类号】:TP393.08
【参考文献】
相关期刊论文 前10条
1 张国平;;基于SDN和Overlay的云计算数据中心网络[J];中国新通信;2015年03期
2 毛晓蛟;杨育彬;;一种基于子空间学习的图像语义哈希索引方法[J];软件学报;2014年08期
3 云安全联盟;王旭东;;2013年云计算的9大威胁[J];通讯世界;2013年08期
4 孟小峰;慈祥;;大数据管理:概念、技术与挑战[J];计算机研究与发展;2013年01期
5 项国富;金海;邹德清;陈学广;;基于虚拟化的安全监控[J];软件学报;2012年08期
6 姜辉;杨峰;段海新;;Rootkit隐藏技术与检测方法研究[J];小型微型计算机系统;2012年05期
7 冯天树;许学东;;Windows木马的各种进程隐藏技术及应对策略[J];信息网络安全;2011年10期
8 张显;黎文伟;;基于多核平台的数据包捕获方法性能评估[J];计算机应用研究;2011年07期
9 刘晓茜;杨寿保;郭良敏;王淑玲;宋浒;;雪花结构:一种新型数据中心网络结构[J];计算机学报;2011年01期
10 刘宝旭;马建民;池亚平;;计算机网络安全应急响应技术的分析与研究[J];计算机工程;2007年10期
相关博士学位论文 前2条
1 林杰;面向服务监控的可控云关键技术研究[D];北京邮电大学;2015年
2 冯振乾;云计算数据中心的网络带宽隔离技术研究[D];国防科学技术大学;2012年
相关硕士学位论文 前2条
1 黄全伟;基于N-Gram系统调用序列的恶意代码静态检测[D];哈尔滨工业大学;2009年
2 王旭乐;基于内容的图像检索系统中高维索引技术的研究[D];华中科技大学;2008年
,本文编号:2214615
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2214615.html