Font Size: a A A

The Research And Implementation Of Network Security And Defense System In Cloud Computing

Posted on:2017-07-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z B SuFull Text:PDF
GTID:2348330518495439Subject:Information security
Abstract/Summary:PDF Full Text Request
As the development of time-sharing system,virtual machine technology,grid computing and distribution computing,cloud computing technology comes into being.Due to the massive utilizations of virtualization technologies,cloud computing integrates various types of hardware into one union resource pool which hides the details of the hardware and provides consistent APIs to users of cloud computing platform.As one of the most outstanding technologies,cloud computing technology has been consistently concerned by academia and industry from the beginning of its first proposed.However,compared to the traditional datacenter,the employment of virtualization,the change of data storage and the diversification of accessing of terminal devices make cloud computing facing more security challenges than ever before.In addition,security issues now largely hinder the cloud computing's further development,and have become obstacles on the way of cloud computing technology.Based on the reasons above,we make systematic researches and analyses on cloud computing security,and give a brief introduction of cloud computing concepts,evolution history,categories and security differences between traditional network and cloud computing network.Under the condition of fully considering the coupling relation between the physical layer and logical layer of cloud computing network,a cloud computing network topology is setup for the study of avalanche effect in cloud computing network environment via related network theories.Based on this network topology,we show that with the addition of protection of some specific nodes in the network structure,ensuring that these nodes cannot be destroyed at the time of under attacking,the robustness of cloud computing's network can be significantly improved whereas the network's structure and functionality remains unchanged.Besides,based on key nodes protection principle,a cloud computing network defense system for cloud computing platform has implemented in this thesis.This system can effectively block the cyber-attacks at their initial state via the transformation that transforms key nodes into functional nodes which can generate defense strategies,to avoid the spread of attacks and the emerge of avalanche effect.To test the performance and functionality of our cloud computing network defense system,a small-scale OpenStack cloud computing platform is built.The test results show that with different types of cyber-attacks,our cloud computing defense system obtained an outstanding score on attack detection ratio and attack intercept ratio,it can rapidly response and process the threats which are launched from various sources.
Keywords/Search Tags:cloud computing, network security, OpenStack, security system, network defense
PDF Full Text Request
Related items