簡易檢索 / 詳目顯示

研究生: 沈彥勳
Yen-Hsun Shen
論文名稱: OpenStack系統控制平面安全性探討與防禦機制設計
Security Issues and Defense Mechanism Design for OpenStack Control Plane
指導教授: 沈上翔
Shan-Hsiang Shen
口試委員: 金台齡
Tai-Lin Chin
沈中安
Chung-An Shen
黃琴雅
Chin-Ya Huang
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2020
畢業學年度: 108
語文別: 英文
論文頁數: 47
中文關鍵詞: 雲端系統網路攻擊網路安全
外文關鍵詞: OpenStack, Cloud System, Cyber Attack, Network Security
相關次數: 點閱:223下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

  • 中文摘要.......... iii Abstract.......... iv Acknowledgment.......... v Table of Contents.......... vi List of Tables.......... viii List of Figures.......... ix 1 Introduction.......... 1 2 Background.......... 3 3 Related Work.......... 6 4 Attack Reproduction and Extension.......... 8 5 Defense Mechanism Design.......... 16 6 Experimental Results and Analysis.......... 21 7 Conclusion.......... 32 References.......... 33

    [1] F. Z. Yousaf, M. Bredel, S. Schaller, and F. Schneider, “Nfv and sdn-key technology enablers for 5g networks,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, pp. 2468–2478, 2017.
    [2] B. Chatras, U. S. Tsang Kwong, and N. Bihannic, “Nfv enabling network slicing for 5g,” in 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), pp. 219–225, 2017.
    [3] Y. Li and M. Chen, “Software-defined network function virtualization: A survey,” IEEE Access, vol. 3, pp. 2542–2553, 2015.
    [4] F. Callegati, W. Cerroni, C. Contoli, and G. Santandrea, “Implementing dynamic chaining of virtual network functions in openstack platform,” in 2015 17th International Conference on Transparent Optical Networks (ICTON), pp. 1–4, 2015.
    [5] S. A. Baset, C. Tang, B. C. Tak, and L. Wang, “Dissecting open source cloud evolution: An openstack case study,” in 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 13), (San Jose, CA), USENIX Association, June 2013.
    [6] W. K. Sze, A. Srivastava, and R. Sekar, “Hardening openstack cloud platforms against compute node compromises,” in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS ‘16, (New York, NY, USA), p. 341-352, Association for Computing Machinery, 2016.
    [7] “What is openstack?.” https://www.openstack.org/software/. Online; accessed 24 June 2020.
    [8] “Install openstack services.” https://docs.openstack.org/install-guide/openstack-services.html#minimal-deployment-for-rocky. Online; accessed 24 June 2020.
    [9] J. O’Hara, “Toward a commodity enterprise middleware,” Queue, vol. 5, p. 48-55, May 2007.
    [10] E. Curry, Message-Oriented Middleware, ch. 1, pp. 1–28. JohnWiley and Sons, Ltd, 2005.
    [11] “Quorum queues.” https://www.rabbitmq.com/. Online; accessed 24 June 2020.
    [12] “Management plugin.” https://www.rabbitmq.com/management.html. Online; accessed 24 June 2020.
    [13] “Message queuing.” https://docs.openstack.org/security-guide/messaging.html. Online; accessed 24 June 2020.
    [14] J.-M. Kim, H.-Y. Jeong, I. Cho, S. M. Kang, and J. Park, “A secure smart-work service model based openstack for cloud computing,” Cluster Computing, vol. 17, 09 2013.
    [15] B. I. Santoso, M. R. S. Idrus, and I. P. Gunawan, “Designing network intrusion and detection system using signature-based method for protecting openstack private cloud,” in 2016 6th International Annual Engineering Seminar (InAES), pp. 61–66, 2016.
    [16] A. Carlsson, “Model of network attack on the cloud platform openstack,” in 2015 Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S T), pp. 245–247, 2015.
    [17] L. Lian, Y. Zhang, H. Zhang, and S. Zhang, “Constructing virtual network attack and defense platform based on openstack,” in Proceedings of the 2015 International Conference on Automation, Mechanical Control and Computational Engineering, pp. 117–122, Atlantis Press, 2015/04.
    [18] A. Bhardwaj, A. Sharma, V. Mangat, K. Kumar, and R. Vig, “Experimental analysis of ddos attacks on openstack cloud platform,” in Proceedings of 2nd International Conference on Communication, Computing and Networking (C. R. Krishna, M. Dutta, and R. Kumar, eds.), (Singapore), pp. 3–13, Springer Singapore, 2019.
    [19] A. Dhanapal and P. Nithyanandam, “An openstack based cloud testbed framework for evaluating http flooding attacks,” Wireless Networks, Jan 2019.
    [20] K. Thimmaraju, B. Shastry, T. Fiebig, F. Hetzelt, J.-P. Seifert, A. Feldmann, and S. Schmid, “The vamp attack: Taking control of cloud systems via the unified packet parser,” in Proceedings of the 2017 on Cloud Computing Security Workshop, CCSW ’17, (New York, NY, USA), p. 11-15, Association for Computing Machinery, 2017.
    [21] J. Zhan, X. Fan, J. Han, Y. Gao, X. Xia, and Q. Zhang, “Ciadl: cloud insider attack detector and locator on multi-tenant network isolation: an openstack case study,” Journal of Ambient Intelligence and Humanized Computing, Sep 2019.
    [22] B. Cui and T. Xi, “Security analysis of openstack keystone,” in 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 283–288, 2015.
    [23] “Vmstate.” https://wiki.openstack.org/wiki/VMState#task_state. Online; accessed 24 June 2020.
    [24] “Install and configure controller node for red hat enterprise linux and centos.” https://docs.openstack.org/nova/rocky/install/controller-install-rdo.html. Online; accessed 24 June 2020.
    [25] “Install and configure controller node.” https://docs.openstack.org/neutron/rocky/install/controller-install-rdo.html. Online; accessed 24 June 2020.
    [26] “Vmstate.” https://wiki.openstack.org/wiki/VMState#vm_state. Online; accessed 24 June 2020.
    [27] “Install and configure a compute node for red hat enterprise linux and centos.” https://docs.openstack.org/nova/rocky/install/compute-install-rdo.html. Online; accessed 24 June 2020.
    [28] “Install and configure compute node.” https://docs.openstack.org/neutron/rocky/install/compute-install-rdo.html#configure-the-compute-service-to-use-the-networking-service. Online; accessed 24 June 2020.
    [29] “Compute service.” https://docs.openstack.org/nova/rocky/install/. Online; accessed 24 June 2020.
    [30] “Install and configure for red hat enterprise linux and centos.” https://docs.openstack.org/neutron/rocky/install/install-rdo.html. Online; accessed 24 June 2020.
    [31] “Messaging security.” https://docs.openstack.org/security-guide/messaging/security.html#queue-authentication-and-access-control. Online; accessed 24 June 2020.
    [32] “Messaging security.” https://docs.openstack.org/security-guide/messaging/security.html#messaging-transport-security. Online; accessed 24 June 2020.

    無法下載圖示 全文公開日期 2025/08/25 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE