研究生: |
沈彥勳 Yen-Hsun Shen |
---|---|
論文名稱: |
OpenStack系統控制平面安全性探討與防禦機制設計 Security Issues and Defense Mechanism Design for OpenStack Control Plane |
指導教授: |
沈上翔
Shan-Hsiang Shen |
口試委員: |
金台齡
Tai-Lin Chin 沈中安 Chung-An Shen 黃琴雅 Chin-Ya Huang |
學位類別: |
碩士 Master |
系所名稱: |
電資學院 - 資訊工程系 Department of Computer Science and Information Engineering |
論文出版年: | 2020 |
畢業學年度: | 108 |
語文別: | 英文 |
論文頁數: | 47 |
中文關鍵詞: | 雲端系統 、網路攻擊 、網路安全 |
外文關鍵詞: | OpenStack, Cloud System, Cyber Attack, Network Security |
相關次數: | 點閱:239 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
[1] F. Z. Yousaf, M. Bredel, S. Schaller, and F. Schneider, “Nfv and sdn-key technology enablers for 5g networks,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, pp. 2468–2478, 2017.
[2] B. Chatras, U. S. Tsang Kwong, and N. Bihannic, “Nfv enabling network slicing for 5g,” in 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), pp. 219–225, 2017.
[3] Y. Li and M. Chen, “Software-defined network function virtualization: A survey,” IEEE Access, vol. 3, pp. 2542–2553, 2015.
[4] F. Callegati, W. Cerroni, C. Contoli, and G. Santandrea, “Implementing dynamic chaining of virtual network functions in openstack platform,” in 2015 17th International Conference on Transparent Optical Networks (ICTON), pp. 1–4, 2015.
[5] S. A. Baset, C. Tang, B. C. Tak, and L. Wang, “Dissecting open source cloud evolution: An openstack case study,” in 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 13), (San Jose, CA), USENIX Association, June 2013.
[6] W. K. Sze, A. Srivastava, and R. Sekar, “Hardening openstack cloud platforms against compute node compromises,” in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS ‘16, (New York, NY, USA), p. 341-352, Association for Computing Machinery, 2016.
[7] “What is openstack?.” https://www.openstack.org/software/. Online; accessed 24 June 2020.
[8] “Install openstack services.” https://docs.openstack.org/install-guide/openstack-services.html#minimal-deployment-for-rocky. Online; accessed 24 June 2020.
[9] J. O’Hara, “Toward a commodity enterprise middleware,” Queue, vol. 5, p. 48-55, May 2007.
[10] E. Curry, Message-Oriented Middleware, ch. 1, pp. 1–28. JohnWiley and Sons, Ltd, 2005.
[11] “Quorum queues.” https://www.rabbitmq.com/. Online; accessed 24 June 2020.
[12] “Management plugin.” https://www.rabbitmq.com/management.html. Online; accessed 24 June 2020.
[13] “Message queuing.” https://docs.openstack.org/security-guide/messaging.html. Online; accessed 24 June 2020.
[14] J.-M. Kim, H.-Y. Jeong, I. Cho, S. M. Kang, and J. Park, “A secure smart-work service model based openstack for cloud computing,” Cluster Computing, vol. 17, 09 2013.
[15] B. I. Santoso, M. R. S. Idrus, and I. P. Gunawan, “Designing network intrusion and detection system using signature-based method for protecting openstack private cloud,” in 2016 6th International Annual Engineering Seminar (InAES), pp. 61–66, 2016.
[16] A. Carlsson, “Model of network attack on the cloud platform openstack,” in 2015 Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S T), pp. 245–247, 2015.
[17] L. Lian, Y. Zhang, H. Zhang, and S. Zhang, “Constructing virtual network attack and defense platform based on openstack,” in Proceedings of the 2015 International Conference on Automation, Mechanical Control and Computational Engineering, pp. 117–122, Atlantis Press, 2015/04.
[18] A. Bhardwaj, A. Sharma, V. Mangat, K. Kumar, and R. Vig, “Experimental analysis of ddos attacks on openstack cloud platform,” in Proceedings of 2nd International Conference on Communication, Computing and Networking (C. R. Krishna, M. Dutta, and R. Kumar, eds.), (Singapore), pp. 3–13, Springer Singapore, 2019.
[19] A. Dhanapal and P. Nithyanandam, “An openstack based cloud testbed framework for evaluating http flooding attacks,” Wireless Networks, Jan 2019.
[20] K. Thimmaraju, B. Shastry, T. Fiebig, F. Hetzelt, J.-P. Seifert, A. Feldmann, and S. Schmid, “The vamp attack: Taking control of cloud systems via the unified packet parser,” in Proceedings of the 2017 on Cloud Computing Security Workshop, CCSW ’17, (New York, NY, USA), p. 11-15, Association for Computing Machinery, 2017.
[21] J. Zhan, X. Fan, J. Han, Y. Gao, X. Xia, and Q. Zhang, “Ciadl: cloud insider attack detector and locator on multi-tenant network isolation: an openstack case study,” Journal of Ambient Intelligence and Humanized Computing, Sep 2019.
[22] B. Cui and T. Xi, “Security analysis of openstack keystone,” in 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 283–288, 2015.
[23] “Vmstate.” https://wiki.openstack.org/wiki/VMState#task_state. Online; accessed 24 June 2020.
[24] “Install and configure controller node for red hat enterprise linux and centos.” https://docs.openstack.org/nova/rocky/install/controller-install-rdo.html. Online; accessed 24 June 2020.
[25] “Install and configure controller node.” https://docs.openstack.org/neutron/rocky/install/controller-install-rdo.html. Online; accessed 24 June 2020.
[26] “Vmstate.” https://wiki.openstack.org/wiki/VMState#vm_state. Online; accessed 24 June 2020.
[27] “Install and configure a compute node for red hat enterprise linux and centos.” https://docs.openstack.org/nova/rocky/install/compute-install-rdo.html. Online; accessed 24 June 2020.
[28] “Install and configure compute node.” https://docs.openstack.org/neutron/rocky/install/compute-install-rdo.html#configure-the-compute-service-to-use-the-networking-service. Online; accessed 24 June 2020.
[29] “Compute service.” https://docs.openstack.org/nova/rocky/install/. Online; accessed 24 June 2020.
[30] “Install and configure for red hat enterprise linux and centos.” https://docs.openstack.org/neutron/rocky/install/install-rdo.html. Online; accessed 24 June 2020.
[31] “Messaging security.” https://docs.openstack.org/security-guide/messaging/security.html#queue-authentication-and-access-control. Online; accessed 24 June 2020.
[32] “Messaging security.” https://docs.openstack.org/security-guide/messaging/security.html#messaging-transport-security. Online; accessed 24 June 2020.