Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment

碩士 === 國立臺灣大學 === 資訊管理學研究所 === 103 === In recent years, the development of information technology not only brings much convenient to us but further changes our life style. The cloud computing is one of the information technology. Owing to the cloud computing, users can subscribe different kinds of f...

Full description

Bibliographic Details
Main Authors: Chia-Jung Chang, 張家榮
Other Authors: Yeong-Sung Lin
Format: Others
Language:en_US
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/40132979089858212896
id ndltd-TW-103NTU05396019
record_format oai_dc
spelling ndltd-TW-103NTU053960192016-11-19T04:09:47Z http://ndltd.ncl.edu.tw/handle/40132979089858212896 Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment 於雲端環境下透過虛擬機器移置與主動式防禦配置以最大化網路存活度 Chia-Jung Chang 張家榮 碩士 國立臺灣大學 資訊管理學研究所 103 In recent years, the development of information technology not only brings much convenient to us but further changes our life style. The cloud computing is one of the information technology. Owing to the cloud computing, users can subscribe different kinds of flexible and scalable services on demand. This feature makes users spend less expense on establishing and maintaining IT infrastructure which attracts many enterprises to build their IT environment through the cloud platform. However, the information security issue is one of the must considered issue to enterprises who are going to adopt the cloud computing. In order to make the enterprise in the cloud environment not interrupt their abilities to provide services, VM Migration mechanism is a useful defense mechanism for avoiding service being disrupted. VM Migration mechanism enables VM dynamically move from one physical server to another and the mechanism can prevent VM from the malicious attack and further increase the network survivability. Besides, the importance of data for company has become more and more significant due to the rise of “Big Data Analysis”. It is special concerned by companies on how to prevent data being compromised by malicious attackers. Secret sharing mechanism is an effective mechanism to prevent data being stolen from attackers, it will cut data into N pieces and need K pieces to reconstruct the data for increasing the difficulty to steal data. Our goal is to help enterprises find out an effective way to prevent external malicious attacks to avoid service disruption or data stolen. In addition to traditional defense strategies such as firewall, IDS, IPS, we will take VM Migration mechanism and secret sharing mechanism introduced before to increase the network survivability. Beside, we will aid enterprises to seek the optimal way of allocating defense resource under limit budget to fight against the invasion of attackers. In our work, since many complex and full of randomness problem, we tried to take Mathematical Programming and Monte Carlo Simulation methods to solve this problem, and we look forward to helping defenders to improve the network survivability through effective allocation of resource. Yeong-Sung Lin 林永松 2015 學位論文 ; thesis 82 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立臺灣大學 === 資訊管理學研究所 === 103 === In recent years, the development of information technology not only brings much convenient to us but further changes our life style. The cloud computing is one of the information technology. Owing to the cloud computing, users can subscribe different kinds of flexible and scalable services on demand. This feature makes users spend less expense on establishing and maintaining IT infrastructure which attracts many enterprises to build their IT environment through the cloud platform. However, the information security issue is one of the must considered issue to enterprises who are going to adopt the cloud computing. In order to make the enterprise in the cloud environment not interrupt their abilities to provide services, VM Migration mechanism is a useful defense mechanism for avoiding service being disrupted. VM Migration mechanism enables VM dynamically move from one physical server to another and the mechanism can prevent VM from the malicious attack and further increase the network survivability. Besides, the importance of data for company has become more and more significant due to the rise of “Big Data Analysis”. It is special concerned by companies on how to prevent data being compromised by malicious attackers. Secret sharing mechanism is an effective mechanism to prevent data being stolen from attackers, it will cut data into N pieces and need K pieces to reconstruct the data for increasing the difficulty to steal data. Our goal is to help enterprises find out an effective way to prevent external malicious attacks to avoid service disruption or data stolen. In addition to traditional defense strategies such as firewall, IDS, IPS, we will take VM Migration mechanism and secret sharing mechanism introduced before to increase the network survivability. Beside, we will aid enterprises to seek the optimal way of allocating defense resource under limit budget to fight against the invasion of attackers. In our work, since many complex and full of randomness problem, we tried to take Mathematical Programming and Monte Carlo Simulation methods to solve this problem, and we look forward to helping defenders to improve the network survivability through effective allocation of resource.
author2 Yeong-Sung Lin
author_facet Yeong-Sung Lin
Chia-Jung Chang
張家榮
author Chia-Jung Chang
張家榮
spellingShingle Chia-Jung Chang
張家榮
Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment
author_sort Chia-Jung Chang
title Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment
title_short Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment
title_full Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment
title_fullStr Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment
title_full_unstemmed Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment
title_sort through virtual machine migration and proactive defense resource allocation to maximize network survivability in a cloud environment
publishDate 2015
url http://ndltd.ncl.edu.tw/handle/40132979089858212896
work_keys_str_mv AT chiajungchang throughvirtualmachinemigrationandproactivedefenseresourceallocationtomaximizenetworksurvivabilityinacloudenvironment
AT zhāngjiāróng throughvirtualmachinemigrationandproactivedefenseresourceallocationtomaximizenetworksurvivabilityinacloudenvironment
AT chiajungchang yúyúnduānhuánjìngxiàtòuguòxūnǐjīqìyízhìyǔzhǔdòngshìfángyùpèizhìyǐzuìdàhuàwǎnglùcúnhuódù
AT zhāngjiāróng yúyúnduānhuánjìngxiàtòuguòxūnǐjīqìyízhìyǔzhǔdòngshìfángyùpèizhìyǐzuìdàhuàwǎnglùcúnhuódù
_version_ 1718395015355432960