期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System 被引量:8
1
作者 Zhen Chen fuye han +2 位作者 Junwei Cao Xin Jiang Shuo Chen 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期40-50,共11页
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bot... Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud- based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively. 展开更多
关键词 cloud computing overlay network collaborative network security system computer forensics anti-botnet ANTI-PHISHING hadoop file system eucalyptus amazon web service
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部