期刊文献+

Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System 被引量:8

Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System
原文传递
导出
摘要 Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud- based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively. Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud- based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively.
出处 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期40-50,共11页 清华大学学报(自然科学版(英文版)
基金 supported by the National Key Basic Research and Development (973) Program of China(Nos.2011CB302805,2011CB302505,2012CB315801,and2013CB228206) the National Natural Science Foundation of China(No.61233016) supported by Intel Research Councils UPO program with the title of Security Vulnerability Analysis Based on Cloud Platform
关键词 cloud computing overlay network collaborative network security system computer forensics anti-botnet ANTI-PHISHING hadoop file system eucalyptus amazon web service cloud computing overlay network collaborative network security system computer forensics anti-botnet anti-phishing hadoop file system eucalyptus amazon web service
  • 相关文献

参考文献46

  • 1R Knickerbocker, D. Yu, and J. Li, Humboldt: A distributed phishing disruption system, in Proc. 1EEE eCrime Researchers Summit, Tacoma, USA, 2009, pp. 1- 12.
  • 2S. Sheng, B. Wardman, G. Warner, L. E Cranor, J. Hang, and C. Zhang, An empirical analysis of phishing blacklists, in Proc. Sixth Conference on Email and AntiSpam ( CEAS 2009), California, USA, 2009, pp. 1-10.
  • 3Google Safe Browsing v2 API, http://code.google.com/ apis/safebrowsing/, 2012.
  • 4APWG, http://www.apwg.org/or http://www.antiphishing. org/crimeware.html, 2012.
  • 5StopBadware, http://stopbadware.org/, 2012.
  • 6D. Ruan, Z. Chen, J. Ni, and E D. Urgsunan, Handling high speed traffic measurement using network processors, in Proc. 2006 International Conference on Communication Technology (ICCT 2006), Beiiing, China, 2006, pp. 1-5.
  • 7J. Ni, Z. Chen, C. Len, and R Ungsunan, A fast multi- pattern matching algorithm for deep packet inspection on a network processor, in Proc. 20071nternational Conference on Parallel Processing (ICPP 2007), 2007, Xi'an, China, pp. 16.
  • 8Z. Chen, C. Lin, J. Ni, D. Ruan, B. Zheng, Z. Tan, Y. X. Jiang, X. Peng, A. Luo, B. Zhu, Y. Yue, Y. Wang, E Ungsunan, and E Ren, Anti-worm NPU- based parallel bloom filters in Giga-Ethernet LAN, in Proc. IEEE International Conference on Communications (ICC), Istanbul, Turkey, 2006, pp. 2118-2123.
  • 9Z. Chen, C. Lin, J. Ni, D. Ruan, B. Zheng, Z. Tan, Y. Jiang, X. Peng, A. Luo, B. Zhu, Y. Yue, J. Zhuang, E Feng, Y. Wang, and E Ren, Anti-worm NPU-based parallel bloom filters for TCP-IP content processing in Giga-Ethernet LAN, in Proc. 1st IEEE LCN Workshop on Network Security (WoNS 2005), Sydney, Australia, 2005, pp. 748-755.
  • 10R. Bye, S. A. Camtepe, and S. Albayrak, Collaborative intrusion detection framework: Characteristics, adversarial opportunities and countermeasures, in Proc. USENIX Symposium on Networked Systems Design and Implementation, Cambridge, MA, USA, 2007, pp. 1-12.

同被引文献35

引证文献8

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部