Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment
碩士 === 國立臺灣大學 === 資訊管理學研究所 === 103 === In recent years, the development of information technology not only brings much convenient to us but further changes our life style. The cloud computing is one of the information technology. Owing to the cloud computing, users can subscribe different kinds of f...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/40132979089858212896 |
id |
ndltd-TW-103NTU05396019 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-103NTU053960192016-11-19T04:09:47Z http://ndltd.ncl.edu.tw/handle/40132979089858212896 Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment 於雲端環境下透過虛擬機器移置與主動式防禦配置以最大化網路存活度 Chia-Jung Chang 張家榮 碩士 國立臺灣大學 資訊管理學研究所 103 In recent years, the development of information technology not only brings much convenient to us but further changes our life style. The cloud computing is one of the information technology. Owing to the cloud computing, users can subscribe different kinds of flexible and scalable services on demand. This feature makes users spend less expense on establishing and maintaining IT infrastructure which attracts many enterprises to build their IT environment through the cloud platform. However, the information security issue is one of the must considered issue to enterprises who are going to adopt the cloud computing. In order to make the enterprise in the cloud environment not interrupt their abilities to provide services, VM Migration mechanism is a useful defense mechanism for avoiding service being disrupted. VM Migration mechanism enables VM dynamically move from one physical server to another and the mechanism can prevent VM from the malicious attack and further increase the network survivability. Besides, the importance of data for company has become more and more significant due to the rise of “Big Data Analysis”. It is special concerned by companies on how to prevent data being compromised by malicious attackers. Secret sharing mechanism is an effective mechanism to prevent data being stolen from attackers, it will cut data into N pieces and need K pieces to reconstruct the data for increasing the difficulty to steal data. Our goal is to help enterprises find out an effective way to prevent external malicious attacks to avoid service disruption or data stolen. In addition to traditional defense strategies such as firewall, IDS, IPS, we will take VM Migration mechanism and secret sharing mechanism introduced before to increase the network survivability. Beside, we will aid enterprises to seek the optimal way of allocating defense resource under limit budget to fight against the invasion of attackers. In our work, since many complex and full of randomness problem, we tried to take Mathematical Programming and Monte Carlo Simulation methods to solve this problem, and we look forward to helping defenders to improve the network survivability through effective allocation of resource. Yeong-Sung Lin 林永松 2015 學位論文 ; thesis 82 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 資訊管理學研究所 === 103 === In recent years, the development of information technology not only brings much convenient to us but further changes our life style. The cloud computing is one of the information technology. Owing to the cloud computing, users can subscribe different kinds of flexible and scalable services on demand. This feature makes users spend less expense on establishing and maintaining IT infrastructure which attracts many enterprises to build their IT environment through the cloud platform.
However, the information security issue is one of the must considered issue to enterprises who are going to adopt the cloud computing. In order to make the enterprise in the cloud environment not interrupt their abilities to provide services, VM Migration mechanism is a useful defense mechanism for avoiding service being disrupted. VM Migration mechanism enables VM dynamically move from one physical server to another and the mechanism can prevent VM from the malicious attack and further increase the network survivability.
Besides, the importance of data for company has become more and more significant due to the rise of “Big Data Analysis”. It is special concerned by companies on how to prevent data being compromised by malicious attackers. Secret sharing mechanism is an effective mechanism to prevent data being stolen from attackers, it will cut data into N pieces and need K pieces to reconstruct the data for increasing the difficulty to steal data.
Our goal is to help enterprises find out an effective way to prevent external malicious attacks to avoid service disruption or data stolen. In addition to traditional defense strategies such as firewall, IDS, IPS, we will take VM Migration mechanism and secret sharing mechanism introduced before to increase the network survivability. Beside, we will aid enterprises to seek the optimal way of allocating defense resource under limit budget to fight against the invasion of attackers.
In our work, since many complex and full of randomness problem, we tried to take Mathematical Programming and Monte Carlo Simulation methods to solve this problem, and we look forward to helping defenders to improve the network survivability through effective allocation of resource.
|
author2 |
Yeong-Sung Lin |
author_facet |
Yeong-Sung Lin Chia-Jung Chang 張家榮 |
author |
Chia-Jung Chang 張家榮 |
spellingShingle |
Chia-Jung Chang 張家榮 Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment |
author_sort |
Chia-Jung Chang |
title |
Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment |
title_short |
Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment |
title_full |
Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment |
title_fullStr |
Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment |
title_full_unstemmed |
Through Virtual Machine Migration and Proactive Defense Resource Allocation to Maximize Network Survivability in a Cloud Environment |
title_sort |
through virtual machine migration and proactive defense resource allocation to maximize network survivability in a cloud environment |
publishDate |
2015 |
url |
http://ndltd.ncl.edu.tw/handle/40132979089858212896 |
work_keys_str_mv |
AT chiajungchang throughvirtualmachinemigrationandproactivedefenseresourceallocationtomaximizenetworksurvivabilityinacloudenvironment AT zhāngjiāróng throughvirtualmachinemigrationandproactivedefenseresourceallocationtomaximizenetworksurvivabilityinacloudenvironment AT chiajungchang yúyúnduānhuánjìngxiàtòuguòxūnǐjīqìyízhìyǔzhǔdòngshìfángyùpèizhìyǐzuìdàhuàwǎnglùcúnhuódù AT zhāngjiāróng yúyúnduānhuánjìngxiàtòuguòxūnǐjīqìyízhìyǔzhǔdòngshìfángyùpèizhìyǐzuìdàhuàwǎnglùcúnhuódù |
_version_ |
1718395015355432960 |