簡易檢索 / 詳目顯示

研究生: 林廷瑋
Lin, Ting-Wei
論文名稱: 在雲端架構下之網路安全與防火牆探討與其相關模擬
The Simulation and Explore of Network Security and Firewall in the Cloud Architecture
指導教授: 張適宇
口試委員: 黃啟祐
汪岱錡
張適宇
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 通訊工程研究所
Communications Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 72
中文關鍵詞: 虛擬機器網路安全繪圖處理器搬遷防火牆
外文關鍵詞: Virtual Machine, Network Security, GPU, Migration, Firewall
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本論文的目的是研究虛擬機器與網路安全相關性以及如何利用繪圖處理器來加速網路防護的效能,出於這個原因,應先了解何謂虛擬機器、網路安全與防火牆研究,像是目前使用防火牆的好處與壞處以及如何設定它們,一但我們對這一塊背景與目前如何使用虛擬機器做搬遷情況有了解之後,本篇論文提出了對在不同實體機器之間虛擬機器的搬遷狀況比較和虛擬機器在傳送檔案時受防火牆的影響分析,並提出了利用繪圖處理器加速網路效能的設計與方法。以上述所提的方式,未來可以被應用並創建在網路的雲端架構上,由於目前世界上對於防火牆與虛擬機器之間的網路安全議題的討論、規範或是相關實際操作的標準都很缺乏,故本篇論文展示一個對於網路安全防護基本上的看法、實驗和運作模式。最後則是點名未來可以繼續研究的方向以及結論。


    Contents 1.Introduction and Literature Review 1 1.1Background 1 1.2Research Motivation 4 1.3Organization of Thesis 5 2.Previous Work 7 2.1Graphics Processing Unit 8 2.2Parallel Computing 9 2.3Encryption and Decryption technologies 11 2.3.1DES&AES 12 2.3.2 RSA 13 2.3.3 Secure Socket Layer 13 2.4The common mode of network attacks 14 2.4.1DDOS(Distributed Denial of Service) 14 2.4.2Fishing 15 2.4.3Trojans 15 2.5Network environment simulator “Mininet” 16 2.6Topology 17 2.7Xen 17 2.8Iptables 19 3. System Architecture 20 3.1 The Algorithm and Architecture by GPU Improve the Network Security 20 3.2 Experiment 1: The relation between different virtual machines doing migrationin the cloud architecture 27 3.2.1 Introduce the meaning of experiment 1 28 3.2.2 The hardware and software used in experiment 1 29 3.2.3 How to implement the experiment 1 32 3.3 Experiment 2: The influence between transfer file and different number of firewall rule 34 3.3.1 Introduce the meaning of experiment 2 35 3.3.2 The hardware and software used in experiment 2 37 3.3.3 How to implement the experiment 2 41 3.4 Experiment 3: The impact of the network environment by different topologies in network environment simulator (Mininet) 47 3.4.1Introduce the meaning of experiment 3 48 3.4.2 The hardware and software used in experiment 3 49 3.4.3 How to implement the experiment 3 50 4. Experiment Result and Discussion 62 4.1 Experiment 1 result 62 4.2 Experiment 2 result 64 4.3 Experiment 3 result 66 5. Conclusion 70 Reference 71

    [1] Urbanska, M., Roberts, M., Ray, I., Howe, A., & Byrne, Z. (2013, February). “Accepting the inevitable: factoring the user into home computer security”.InProceedings of the third ACM conference on Data and application security and privacy (pp. 325-332).ACM.

    [2] Jang, K., Han, S., Han, S., Moon, S., & Park, K. "Accelerating ssl with gpus". In: ACM SIGCOMM Computer Communication Review. ACM, 2010. p. 437-438.

    [3] Jang, K., Han, S., Han, S., Moon, S. B., & Park, K. "SSLShader: Cheap SSL Acceleration with Commodity Processors." In: NSDI. 2011.

    [4] Adeyinka, Olalekan. "Internet attack methods and internet security technology." In: Modeling & Simulation, 2008. AICMS 08. Second Asia International Conference on.IEEE, 2008. p. 77-82.

    [5] http://en.wikipedia.org/wiki/Graphics_processing_unit , June 2014

    [6] http://en.wikipedia.org/wiki/Parallel_computing ,June 2014

    [7] http://en.wikipedia.org/wiki/Encryption , June 2014

    [8] http://en.wikipedia.org/wiki/Data_Encryption_Standard, June 2014

    [9] http://en.wikipedia.org/wiki/RSA_(cryptosystem), June 2014

    [10] http://en.wikipedia.org/wiki/Transport_Layer_Security, June 2014

    [11] http://en.wikipedia.org/wiki/Trojan_horse_(computing) , June 2014

    [12] http://www.chou-it.com/info/trd/vm/xen01.html, 2013

    [13] Duan, Qi, and Ehab Al-Shaer. "Traffic-aware dynamic firewall policy management: techniques and applications." Communications Magazine, IEEE 51.7 (2013).
    [14] Kuzmanovic, Aleksandar, and Edward W. Knightly. "Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants." In: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, 2003. p. 75-86.

    [15]http://reproducingnetworkresearch.wordpress.com/2013/03/13/cs-244-13-low-rate-tcp-targeted-dos-attack/, 2013

    [16] http://linux.vbird.org/linux_server/0250simple_firewall.php#local_rule, 2011

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE